17 ans à aider les entreprises françaises
à choisir le meilleur logiciel

En savoir plus sur Greenbone

Un ensemble d'outils de gestion des vulnérabilités sécurisés par SSL, y compris un scanner système et un gestionnaire de contrôle d'accès.

En savoir plus sur Greenbone

Avantages :

Non disponible

Inconvénients :

Non disponible

Greenbone - Notes

Note moyenne

Facilité d'utilisation
3,8
Service client
3,8
Fonctionnalités
4,1
Rapport qualité-prix
4,7

Probabilité de recommander le produit

8/10

Greenbone a reçu une note globale de 4,1 étoiles sur 5 d'après 8 avis d'utilisateurs publiés sur Capterra.

Avez-vous déjà utilisé Greenbone ?

Partagez vos expériences avec d'autres acheteurs de logiciels.

Filtrer les avis (8)

Joseph
Joseph
Full Time Lecturer - College of Business & Economics (É.-U.)
Utilisateur LinkedIn vérifié
Enseignement supérieur, 1 001–5 000 employés
Temps d'utilisation du logiciel : plus d'un an
Source de l'avis

Alternatives envisagées précédemment :

Vulnerability Tests Out the Wazoo

5,0 il y a 3 ans

Commentaires : We struggled with protecting ourselves, but Greenbone helped us think like an attacker which made us smarter. Sort of like when police hire a profiler to get in the mind of a killer to better understand where/when he might strike again.

Avantages :

Most people, especially executives, can be unaware of the many vulnerabilities that expose a network. But all it takes is a dramatic cyberattacks to make embarrassing headlines could also mean big liabilities. Greenbone instantly kicks in when occurrences become recognizable and begins to create an appropriate vulnerability test.

Inconvénients :

It was hard to get everyone trained to an appropriate level.

Utilisateur vérifié
Utilisateur LinkedIn vérifié
Externalisation/délocalisation, 1 001–5 000 employés
Temps d'utilisation du logiciel : 6 à 12 mois
Source de l'avis

Vulnerability Management

5,0 il y a 6 ans

Avantages :

I am using the free version (AKA VM Image) It is limited and the plugins are "ok" at best.

Inconvénients :

If you have nothing, then this is the cheapest option. It isn't the best option (I haven't used their paid version). The free version does have some limitations, such as scheduled scans.

Ivan
Ivan
Technical Services (Venezuela)
Utilisateur LinkedIn vérifié
, 11–50 employés
Temps d'utilisation du logiciel : 6 à 12 mois
Source de l'avis

Okay for quick glance vulnerability scanner

3,0 il y a 7 ans

Commentaires : Quick glance over vulnerability scanning, allows me to work on the obvious vulnerabilities first, so I can use a proper vulnerability scanner to work on the harder-to-find ones.

Avantages :

For getting a quick glance and weeding out easy vulnerabilities is just fine. The management with the Greenbone Security Assistant makes it more bearable.

Inconvénients :

The reports aren't easy to digest. The vulnerability checking sometimes isn't accurate enough for enterprise-grade reports.

Utilisateur vérifié
Utilisateur LinkedIn vérifié
Logiciels, 51–200 employés
Temps d'utilisation du logiciel : plus d'un an
Source de l'avis

One of the best free Vulnerability Scanner

4,0 il y a 6 ans

Commentaires : Overall good for Freelancers to take up small scale projects, gives substantial report.

Avantages :

Best thing about this is this tool is free and developed vast community. Finds common vulnerabilities very fast and gives proper report. Good for small scale enterprises. Comes bundled with KALI Linux, Gives fast results. Easy to use, user friendly GUI

Inconvénients :

Plugins are not updated regularly for latest vulnerabilities, so misses most of the latest vulnerabilities. Doesn’t support all operating system out there. need to increase support to all operating systems Credentialed scans cannot be done properly on this tool.

Jacek
IT Security Engineer (Pologne)
Logiciels, 501–1 000 employés
Temps d'utilisation du logiciel : plus d'un an
Source de l'avis

Great open source alternative to Nessus

4,0 il y a 6 ans

Avantages :

+ OpenSource and free + Included in various security oriented linux distros (e.g. Kali) + Great tool to start vulnerability scanning in your network

Inconvénients :

- Much slower than Nessus - User interface is not as refined as in commercial competition

Utilisateur vérifié
Utilisateur LinkedIn vérifié
Services et technologies de l'information, 11–50 employés
Temps d'utilisation du logiciel : plus de deux ans
Source de l'avis

OpenVas

4,0 il y a 5 ans

Avantages :

I like the fact there is a quick deployment option using a virtualized image.

Inconvénients :

There needs to be a quick start guide setup to help get users up and running that covers the basics of how the engines/databases get updated.

Tejas
Tejas
Associate Security Consultant (Inde)
Utilisateur LinkedIn vérifié
Informatique et sécurité réseau, 51–200 employés
Temps d'utilisation du logiciel : 6 à 12 mois
Source de l'avis

Very good open source vulnerability scanning tool.

4,0 il y a 6 ans

Commentaires : Very good vulnerability scanner.

Avantages :

This tool free of cost and is and also open source and also Openvas comes packaged with KALI linux and It has very handy greenbone user interface. This tool supports vulnerability scanning for both host and network. Openvas can generate the vulnerability report after the scan is completed of all vulnerabilities or treats that are detected as high, medium, low in well understandable format.

Inconvénients :

The plugins are not updated frequently as other vulnerability scanners like Nessus.

Utilisateur vérifié
Utilisateur LinkedIn vérifié
Services et technologies de l'information, Auto-entrepreneur
Temps d'utilisation du logiciel : 1 à 5 mois
Source de l'avis

Discover Unknown Vulnerabilities with Ease

4,0 il y a 6 ans

Avantages :

Comes free and open source, and for the most part stands up to paid vulnerability scanners. For those using Kali is comes pre installed with the distro, which saves you a step. Overall for small businesses and home users this is an excellent choice.

Inconvénients :

This can be a little complex to operate depending on how it is setup. Beyond that some things are not possible in this tool. For example, you can only do non-credentialed scans with OpenVAS, while other vulnerability scanners can accommodate using credentials.