Codenomicon Defensics Archived Reviews (More than two years old)

Filter by:Reset all filters
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Real User
Application Secutiy Engineer at a healthcare company with 11-50 employees
Jan 17 2017

What is most valuable?

This collection of storage-related components were most valuable in extending a security assurance program into the area of black-box security testing for a NAS appliance.

How has it helped my organization?

A security assurance engineer was able to perform due diligence across all network-facing protocols. My prior organization designed, developed and deployed a Network Attached Storage (NAS) appliance. A key part of the company wide security… more»

What needs improvement?

It requires understanding the Defensics protocol.

What's my experience with pricing, setup cost, and licensing?

Start out with a single use per protocol, and expand to multiple units as needed.

Which other solutions did I evaluate?

No other COTS or open-source software fulfilled this testing requirement. There are various protocol-specific testing suites, but most do not focus both the depth and breadth of each of the protocol's specific features.
Vendor
Security Product Validation Apprentice Engineer at a aerospace/defense firm with 1,001-5,000 employees
Jun 03 2015

What is most valuable?

* Test cases are not generated on the fly (which means that it isn't really fuzzing per se). They are organized in groups and defined according to the type of message and the tested part of the message. Compared to more random tools, fuzzing sessions can take less time and be more relevant. * Simple… more»

What needs improvement?

* You can't implement proprietary ciphering algorithms, nor can you modify protocol models if you need to test customized public protocols. * You can't use the program at all without the USB license dongle. This would be useful for instance to export results, prepare the wizard, and so on. It can be… more»

Which solution did I use previously and why did I switch?

I didn't use a previous solution.

Which other solutions did I evaluate?

We also met people from BreakingPoint (Ixia) and µSecurity (Spirent). I also tested an open-source solution, Peach.

What is Codenomicon Defensics?

Defensics is a next-generation security testing platform that enables builders and users of technology to rapidly, reliably and efficiently find and correct dangerous errors and flaws. By proactively bringing the unknown into total view, Defensics sets the bar for superior vulnerability management.
Also known as
Defensics
Codenomicon Defensics customers
Coriant, CERT-FI, Next Generation Networks
BUYER'S GUIDE
Download our free Application Security Report and find out what your peers are saying about Codenomicon, Synopsys, Spirent, and more!