Loading...

Halo Security Application Scanning is a commercial Dynamic Application Security Testing tool developed by Halo Security. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Halo Security Application Scanning, including their key features and shared capabilities.
DAST tool for scanning web apps, microservices, and APIs for vulnerabilities
Shares 5 capabilities with Halo Security Application Scanning: SQL Injection, Web Security, OWASP, XSS +1 more
DAST scanner for Single Page Applications using headless browser technology
Shares 4 capabilities with Halo Security Application Scanning: Web Security, OWASP, XSS, DAST
DAST tool for scanning web apps and APIs for OWASP Top 10 vulnerabilities
Shares 4 capabilities with Halo Security Application Scanning: SQL Injection, OWASP, XSS, DAST
DAST scanner for web apps & APIs with automated vuln detection & remediation
Shares 4 capabilities with Halo Security Application Scanning: SQL Injection, Web Security, XSS, DAST
Cloud-based DAST solution for web app & API security with AI-powered scanning
Shares 3 capabilities with Halo Security Application Scanning: Web Security, OWASP, DAST
DAST scanner for web apps and APIs with OWASP Top 10 vulnerability detection
Shares 3 capabilities with Halo Security Application Scanning: Web Security, OWASP, DAST
CI/CD-integrated DAST tool for automated web app and API vuln scanning.
Shares 3 capabilities with Halo Security Application Scanning: Web Security, OWASP, DAST
Managed web app security scanning service covering OWASP Top 10 vulnerabilities
Shares 3 capabilities with Halo Security Application Scanning: Web Security, OWASP, DAST
DAST tool for scanning web apps, microservices, and APIs for vulnerabilities
DAST scanner for Single Page Applications using headless browser technology
DAST tool for scanning web apps and APIs for OWASP Top 10 vulnerabilities
DAST scanner for web apps & APIs with automated vuln detection & remediation
Cloud-based DAST solution for web app & API security with AI-powered scanning
DAST scanner for web apps and APIs with OWASP Top 10 vulnerability detection
CI/CD-integrated DAST tool for automated web app and API vuln scanning.
Managed web app security scanning service covering OWASP Top 10 vulnerabilities
AI-enhanced web app vulnerability scanner with zero false-positive SLA
DAST platform for web app & API vulnerability scanning with AI-enabled features
Web application vulnerability scanner with automated authentication support
DAST tool for automated web app and API vulnerability scanning
DAST solution for mobile and web app security testing and vulnerability scanning
DAST scanner for web apps & APIs with CI/CD integration & 15k+ test cases.
DAST scanner for discovering and testing APIs and web apps for vulns.
DAST solution for web apps and APIs with automated scanning capabilities
DAST scanner with proof-based vulnerability validation and CI/CD integration
AI-powered AppSec platform for DAST, IAST, API security with auto-remediation
DAST tool for automated web app and API vulnerability scanning and testing
Enterprise DAST solution for runtime app and API security testing
DAST scanner that identifies web app vulnerabilities and attack surfaces
Runtime application security library blocking zero-days & OWASP Top 10 attacks
Dynamic application security testing tool for runtime vulnerability detection
AI-powered DAST scanner for web app vulnerability detection with zero false positives
DAST tool that scans live web apps to detect vulnerabilities in real-time
AI-powered AppSec platform for DAST, IAST, and API security testing
Enterprise DAST platform for web apps, APIs, business logic, and LLM security
DAST tool for continuous automated security testing of web and mobile apps
Automated API security testing tool integrated into CI/CD pipelines
DAST scanner for APIs and web apps with AI-powered testing and low FP rate
Web app vulnerability scanner with continuous scanning and authenticated testing
Full-stack web app security testing platform with SAST, DAST, SCA, and pentesting
Managed application security testing service for web applications
Automated DAST tool for continuous web app and API vulnerability scanning.
Dynamic web app & API vulnerability scanner with free and paid tiers.
Web app security platform for vulnerability scanning & secure dev.
DAST platform for scanning web apps & APIs within CI/CD pipelines.
w3af is an open source web application security scanner that identifies over 200 types of vulnerabilities including XSS, SQL injection, and OS commanding in web applications.
A Java based HTTP/HTTPS proxy for assessing web application vulnerability with various useful features.
Web-application vulnerability scanner with extensive coverage of security testing modules.
A web security tool that scans for vulnerabilities and known attacks.
DAST platform for API and web app security testing with business logic focus
AppSec platform with API discovery, CI/CD-native DAST, and risk oversight
An enterprise-scale dynamic application security testing (DAST) platform that provides automated vulnerability scanning and security assessment for web applications.
DAST platform with API discovery, shift-left testing, and AppSec oversight
AI-powered platform for continuous automated penetration testing of web apps
Akamai Client-Side Protection & Compliance is a security tool that monitors and protects against client-side threats on websites, aiding in PCI DSS v4.0 compliance.
Black box fuzzer and DAST tool for testing application security
Common questions security professionals ask when evaluating alternatives and competitors to Halo Security Application Scanning.
The most popular alternatives to Halo Security Application Scanning include VulnSign Dynamic Application Security Testing, AppCheck SPA Scanner, Intruder Web Application Scanning, Acunetix Web Application & API Security, and Qualys TotalAppSec. These Dynamic Application Security Testing tools offer similar capabilities and are frequently compared by security professionals evaluating their options.