Secure Bytes Releases Secure Auditor 3.0

Secure Bytes is making waves in IT security by releasing Secure Auditor 3.0 which is the most advanced and comprehensive, unified digital risk management solution. The new improved version comes bundled with 45 essential security tools and utilities.
Spread the Word
Listed Under


• Computer Security Software

West Chicago - Illinois - US


June 28, 2012 - PRLog -- The dynamic Report Module embedded in Secure Auditor is the most distinguished feature as it can generate more than 80 different security reports on various aspects of an organization’s digital infrastructure. Regulatory compliance (such as PCI-DSS, HIPAA, SOX) can be effortlessly assisted with the use of this software. Version 3.0 has the following enhancements:
•   Improved User Friendly GUI
•   Improved Speed and Efficiency
•   New Security Tools
•   Inclusion of the OVAL vulnerabilities database
•   Introduced 64 Bit version with SQL 2008
•   HIPAA and PCI-DSS focused Tools
Secure Auditor 3.0 conducts automated security assessments on Windows, Oracle and SQL Server databases and Cisco devices.
Secure Auditor’s suite 3.0 consists of four 4 modules:

Secure Oracle Auditor helps organizations in the time-consuming process of conducting security assessments and identifying vulnerabilities in Oracle Databases within minutes and suggests solutions for mitigating them.

Embedded Oracle Security Tools:
•   Oracle SID Tester
•   Oracle Default Password Tester
•   Oracle TNS Password Tester
•   Oracle Password Auditor
•   Oracle Access Rights Auditor
•   Oracle Brute Force Tester
•   Oracle Event Log Analyzer
•   Oracle PCI Compliance Check
•   Ora HIPAA Compliance Check
•   Oracle Query Browser

Secure Windows Auditor conducts in-depth audit on Windows based machine and helps organization in securing them from internal and external threats. Secure Windows Auditor identifies vulnerabilities and proposes solutions for remediation.

Embedded Windows Security Tools:

1.    Windows Password Auditor
2.    Windows Event Log Analyzer
3.    Windows Asset Inventory Viewer
4.    Windows Remote Control
5.    FTP Brute Force Tester
6.    MySQL Brute Force Tester
7.    Win PCI Compliance Check
8.    Win HIPAA Compliance Check

Secure Cisco Auditor conducts a thorough vulnerability assessment on Cisco routers & switches and identifies weak areas and security loopholes. Secure Cisco Auditor generates detailed reports which provide step by step solutions for remediation of vulnerabilities and also provides proof of where the vulnerabilities exist.

Embedded Cisco Security Tools:
1.    Cisco Configuration Manager
2.    Cisco Type7 Password Decryptor
3.    Cisco MD5 Password Auditor
4.    Cisco Firewall Password Auditor
5.    IP Calculator
6.    Cisco SNMP Brute Force Tester
7.    Cisco VPN Password Auditor
8.    Cisco Switch Port Mapper
9.    Cisco Configuration Backup Tool

Secure SQL Auditor helps organizations by securing SQL servers by conducting comprehensive audits. Secure SQL Auditor conducts automated audits on SQL databases within minutes and provides accurate results along with solutions for mitigation. Hence Secure SQL Auditor secures SQL database from threats and malicious activity.
Embedded SQL Server Security Tools:
1.    SQL Server Default Password Tester
2.    SQL Server Password Auditor
3.    SQL Server Access Right Auditor
4.    SQL Server Event Log Analyzer
5.    SQL Server Brute Force Tester
6.    SQL Server Query Browser
7.    SQL PCI Compliance Check
8.    SQL HIPAA Compliance Check

Embedded General Security Tools:

1.    Traceroute
2.    Port Scanner
3.    SNMP Browser
4.    SNMP Scanner
5.    Whois
6.    DNS Auditor
7.    Mac Detector
8.    DNS Lookup
9.    HTTP Brute Force Tester
10.    SSH Brute Force Tester

About Secure Bytes:
Secure Bytes is a IT Security Software development Company Which offers Secure Auditor suite is the most advanced and comprehensive, unified digital risk management solution, which consists of computer security, database security, network security software, Network security tools, regulatory compliance, database auditing, vulnerability assessments.
Email:*** Email Verified
Tags:Computer, Security, Software, Database, Network
Industry:Computer Security Software
Location:West Chicago - Illinois - United States
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse

Like PRLog?
Click to Share