With our technology you don't have to install anything yourself.
Our scans will not unnecessarily burden your site.

What technology does Trust Guard use to scan?

We scan your website, web applications and web servers for you to find security weaknesses and vulnerabilities that might give hackers an opportunity to do damage. We will identify and report these website security issues to you There is nothing to install and our scans will not disturb your site or visitors.

How does our vulnerability scanner work

Every scan starts by testing the equipment that hosts your site. No matter how carefully coded your pages are, if the host equipment is vulnerable, your site is at risk. The below dangerous vulnerabilities can be identified by the vulnerability scanner:

  • SQL Injection
  • XSS (Cross Site Scripting)
  • File Disclosure
  • Remote File Inclusion
  • PHP/ASP Code Injection
  • Directory Traversal

Website vulnerability scanner in detail

  1. Port Scanner – An investigation of ports on the web server (web, FTP, mail, Exchange and SQL) plus your firewalls. Whether you have just a blog, or a complex retail website, we will find your open ports and detect what services are running on those ports.
  2. Vulnerability scan – At every open port our website vulnerability scanner will identify every service present and determine how it is configured. These services and configurations are compared to a database of thousands of vulnerabilities. If there is a potential vulnerability, we will actively test it to determine if a weakness exists.
  3. Website scan – A search and cataloging of web site pages is then completed and every unique, dynamic page is tested against every family of security risk. We have the most in-depth, automated testing for SQL injection and Cross Site Scripting (XSS) available.
  4. Reporting – Our detailed reports classify the risks discovered according to their potential severity. This can help you determine the order of resolving the vulnerabilities.
  5. Analysis – Each report includes recommendations on how to handle each security risk.
  6. Certification – When your website is secure, you may display our Trust Guard Seal. – Improve your visitor’s confidence and your sales.

Scanning takes place continuously and scans are optimally updated (up-to-date)

  • A flexible, accurate, low maintenance Vulnerability Assessment and Management solution that delivers solid security improvements
  • Continually scan for network and application vulnerabilities
  • Daily updates and specialized testing methodologies to catch 99.99% of detectable vulnerabilities
  • Data driven, flexible reporting options to empower IT teams

Scanning of IPV6 addresses can now be done by Trust Guard

IPv6 addresses can now also be scanned by Trust Guard!

The internet has been popular since the early nineties and we already knew then that the internet protocol version 4 (IPv4) was not designed for the future. The IPv4 protocol is 32 bits and is therefore limited to approximately 4.3 billion addresses. We now have the 128-bit IPv6 protocol with more than enough addresses for all earthlings and the internet of things.

IPv6 is actually a new internet that exists in this parallel to the IPv4 network, but in the future the existing network will be completely replaced.

How do you recognize an IPv6 address?

Everyone recognizes an IPv4 address, for example and the IPv6 address looks like this: 2001: 0db8: 85a3: 0000: 1319: 8a2e: 0370: 7344

Benefits of IPv6

  • IPv4 = 32 bits and IPv6 = 128 bits (that means many more address options)
  • Better routing and network auto configuration.
  • Data security at IP level.
  • Branches will receive their own blocks of IP addresses (such as banks, municipalities, etc.)

IPv6 & Trust Guard

Trust Guard has, together with its scanning partner, added the option to the dashboard to scan an IPv6 address. If you want to scan a device, you can indicate whether it is a URL, IPv4 or IPv6. Based on this information, the device will be scanned and the results will be reported in our dashboard overview with a clear explanation of the vulnerabilities found.

If you want to test, you can do so for free for two weeks and without any obligation.