2021-03-26T12:05:33Z

What is your primary use case for PortSwigger Burp Suite Enterprise Edition?

Miriam Tover - PeerSpot reviewer
  • 0
  • 4
PeerSpot user
6

6 Answers

RP
Real User
Top 10
2024-02-05T12:00:11Z
Feb 5, 2024

We use the solution for dynamic application scanning. We used the solution in a big IT solution company to do some certification for the government agency.

Search for a product comparison
HA
Real User
Top 5
2023-12-12T10:11:43Z
Dec 12, 2023

We use PortSwigger Burp Suite Enterprise Edition for application security.

Iwegbue Godspower Isioma - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-11-20T12:49:10Z
Nov 20, 2023

We use the solution for vulnerability assessment and penetration testing. We can escalate vulnerabilities. We can also use it for mobile app traffic detection and SQL injection.

SS
Real User
Top 20
2022-08-23T20:17:44Z
Aug 23, 2022

PortSwigger Burp Suite Enterprise Edition is a web application interceptor. It can intercept the traffic between the client and the server.

RP
Real User
2021-05-14T17:29:26Z
May 14, 2021

I'm using the solution for the vulnerability scan and for basically all the kinds of applications that we use in our environment. My client is a product-based company - one of the premier Fortune 500 companies, and they are into medical equipment product manufacturing. We develop quite a lot of applications for our hardware and some of the internal requirements as well. Those applications only get deployed in hospitals and other kinds of medical equipment. I'm using it for vulnerability scanning and more for application scanning.

RP
Real User
2021-03-26T12:05:33Z
Mar 26, 2021

We use both Burp Suite Professional and the Enterprise Edition for manual application assessments and dynamic assessments at my client's company.

Find out what your peers are saying about PortSwigger, Tenable, Invicti and others in Vulnerability Management. Updated: March 2024.
765,234 professionals have used our research since 2012.
Vulnerability Management
What is vulnerability management? Vulnerability management is the meticulous, exhaustive, systematic process implemented to discover any potential threats or vulnerabilities, stop those threats, and repair those vulnerabilities before any serious problems develop with your important operating systems. Vulnerability management also involves fixes and patches to repair those threats and vulnerabilities. It is generally accomplished in combination with additional risk assessment and...
Download Vulnerability Management ReportRead more