Loading

vSTAAS – an Integrated Pen-Testing Tool
Grusha Kaur Sahni1, K. Ravindranath2

1Grusha Kaur Sahni*, Department of CSE, KLEF, Vaddeswaram, (A.P), India.
2Dr. K Ravindranath, Associate Professor, Department of CSE, KLEF, Vaddeswaram, (A.P), India.
Manuscript received on November 27, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 973-975 | Volume-9 Issue-2, December, 2019. | Retrieval Number:  A2221109119/2020©BEIESP | DOI: 10.35940/ijeat.A2221.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With the increasing threat in the cyber world, securing our networks and applications are becoming costlier. An enormous quantity of cash is being spent on direct or indirect resources. Along with this, with the increasing number of tools in the market, it is leading to confusion in the IT Industry. How can we reduce the amount spent by the organization on these resources without compromising the company’s security and get deep security insight on projects? For this, vSTAAS orchestrates the process of testing applications for flaws and vulnerabilities by Integrating Solutions, Increasing Accuracy, Simplify Management, and Accelerates the testing of Third-Party Software. It offers Strong, actionable intelligence with RPA, Machine Learning, and AI Automation concerning security requirements across the SDLC. The end to end automated Application & Infrastructure security solution helps users to secure their web/mobile/infra applications. It provides costeffective solutions with necessary remediation and posts remediation revalidation measures. The Centralized portal helps customers to review the report on vulnerability risk remediation status with high-quality end to end testing across SDLC phases.
Keywords: Pen-Testing, SAST, DAST, Mobile, API, Network, Automation, Risk rectification.