Netsparker Web Application Security Scanner Other Advice

Ivan Biagi
Security Specialist at a tech consulting company with 1-10 employees
You can use Netsparker but use it carefully as some payloads can be dangerous in production. This is the same as Acunetix, WebInspect, and others. Every scanner should have an option like Burp Suite to use dangerless payloads (with Distribute Damage extension). View full review »
Paolo Da Ros
Founding Partner at da ros e associati srl
There are many average products on the market, but I prefer Netsparker because to me wasting time after false positives is the worst thing that can happen. Accuracy is the most important thing to me. I rate Netsparker eight out of ten. View full review »
reviewer1188708
Senior Quality Control Manager at a insurance company with 51-200 employees
We're using a demo of the latest version for a POC. We used the on-premises deployment model. I'd recommend Netsparker for anyone who wants to make a security assessment for web applications. I'd rate the solution nine out of ten. The tool is full of useful features. However, the intercepting reviews in terms of web requests need some enhancements to be more usable. View full review »
Find out what your peers are saying about Netsparker, Acunetix, PortSwigger and others in Application Security. Updated: December 2019.
390,810 professionals have used our research since 2012.
Nur Yesilyurt
Attack Developer at a tech vendor
I rate it at nine out of 10 because, although I have used many web application scanners by now, Netsparker gives the fewest false-positives. That's the most important property for a web application scanner. When you buy a web application scanner, you actually pay for two features: non false-positive detection, and attack diversity. Other features affect the quality of a product. So, Netsparker deserves a nine. View full review »
Find out what your peers are saying about Netsparker, Acunetix, PortSwigger and others in Application Security. Updated: December 2019.
390,810 professionals have used our research since 2012.