Nipper Tabs | Titania
  • Overview
  • Reporting
  • Supported Devices
  • Scanner Comparison
  • System Requirements

Nipper Overview

Security that keeps you steps ahead

Harden your network infrastructure before attacks happen


Nipper Studio was the 1st advanced and detailed configuration auditing tool in the world. It is the configuration auditing tool of choice, for enterprise clients in 80 countries.
It helps you harden and secure vital network devices, such as Firewalls, Switches and Routers.

  • Detailed configuration reporting, gives quick, clear views of device settings.
  • Scriptable for 24/7 vulnerability alerts, 365 days a year.
  • Enhances enterprise scanning systems & removes accuracy concerns.
  • Audits against industry standards such as CIS, STIG & NIST benchmarks.
  • Our “Best Practice” security audits (combining multiple industry checks).
  • Rating systems and mitigation advice, helps you prioritize and plan fixes.
  • Automated configuration auditing is comprehensive, fast and efficient.
  • Audit systems in less time, without mass network traffic generation.
  • Simple to use. No lengthy implementation investment or roll-out required.
  • Agentless. No additional software or systems to install or maintain.
  • Audit offline, online, physical, virtual and isolated systems.
  • Tools can be scheduled, scripted and work on multiple platforms.
  • Integrates easily with existing systems.
  • Easily customize settings to suit your own policies.
  • Data outputs can be included into your current solutions.

The result?
Nipper Studio is a quick to implement, efficient and scalable tool, that users love. Perform a build review on your firewall, switch or router configurations – discover new vulnerabilities (that others might find) & harden your networks, today. Take a free trial

Nipper Reporting

Nipper Studio has a wealth of different report options to fit your auditing needs.

Whether you are striving to become compliant with an industry standard or to your own security targets, Nipper Studio’s reports can help you achieve your goal quickly and easily.

Security Audit Logo

Perform a "best practice" security audit (combining multiple industry checks). Use rating systems and mitigation advice to prioritize and plan your fixes.

Detailed configuration reporting, including information such as: filtering, routing protocols, administration services & more. This report offers a quick, clear view of your device settings.

Audit against global public vulnerability repositories such as the:
US Govt NVD (National Vulnerability Database) & the NIST CVE (Common Vulnerability and Exposures) databases. Security issues in the public domain are even easier to exploit, this report helps you quickly find and plug these holes.

The CIS (Center for Internet Security) benchmark reports, can be run against Cisco ASA & Cisco IOS Devices. These reports have been externally certified by CIS and verified as auditing against their baseline.

PCI (Payment Card Industry) audits, perform the automatable system checks and support integrating this verified data with non-automatable policy checks. Results offer detailed advice, verifying passes and explaining failures, so you can quickly become compliant. 

U.S. Military STIG compliance audit developed in conjunction with DoD IA user groups. Nipper Studio is favored by many Government and Defense agencies because reports are detailed, verifiable and include remediation in line with STIG baselines. Reports can be generated offline for secure environments and scaled up to audit any number of devices.

A compliance audit against the SANS policy documents. The SANS institute is a trusted industry body which also trains information security professionals. Their policy is a great compliance benchmark to audit against in order to assess your security level.

Nipper Studio Supported Devices

Cisco ASR (IOS XR)
Cisco Aironet (IOS)*
Cisco Aironet Wireless AP (IOS)
Cisco Catalyst Switches (CatOS)
Cisco Catalyst Switches (IOS)*
Cisco Catalyst Switches (NMP)
Cisco CRS (IOS XR)
Cisco Content Services Switches
Cisco Nexus Appliances*
Cisco Routers (IOS)*
Cisco Routers (IOS XR)
Cisco Security Appliance (ASA)*
Cisco ASA Applicance Contexts*
Cisco Security Appliance (FWSM)
Cisco Security Appliance (PIX)
Cisco PIX Appliance Contexts
Cisco Wireless LAN

Check Point IP Firewalls
Check Point Firewall Management*
Check Point Power-1 Firewalls*
Check Point VPN-1 Firewalls*
Check Point Appliance*

Juniper E Series Routers
Juniper EX Series Switches
Juniper IDP Devices
Juniper ISG Firewalls
Juniper J Series Routers
Juniper M Series Routers
Juniper MX Series Routers
Juniper NetScreen Firewalls*
Juniper SA SSL VPN (IVE)
Juniper SA SSL VPN (JunOS Pulse)
Juniper SRX Firewalls*
Juniper SSG Firewalls (JunOS)
Juniper SSG Firewalls (ScreenOS)
Juniper T Series Routers

WatchGuard 2 Series Firewalls
WatchGuard 5 Series Firewalls
WatchGuard 8 Series Firewalls
WatchGuard 1050 Firewalls
WatchGuard 2050 Firewalls
WatchGuard XTMv
WatchGuard XTM 1500*
WatchGuard XTM 2520*
WatchGuard XTM 3 Series*
WatchGuard X Core (XTM)*
WatchGuard X Edge (SS)
WatchGuard X Edge (XTM)*
WatchGuard X Peak (XTM)*





3COM 4200 Series Switches
3COM 4400 Series Switches
3COM 4500 Series Switches
3COM 5500 Series Switches
3COM SuperStack 3 Firewalls
3COM TippingPoint IDS/IPS



Alteon Switched Firewall (CP)



Arista Routing Switch



Barracuda NetContinuum



Bay Networks Accelar Switches



Blue Coat ProxySG



Brocade BigIron Switch
Brocade FastIron Switch
Brocade NetIron Switch
Brocade ServerIron
Brocade ICX Switch (IronWare)



Crossbeam Firewalls



CyberGuard Firewalls (SecureOS 6)



Dell PowerConnect J EX-Series
Dell PowerConnect J SRX
Dell PowerConnect Switches
Dell SonicWALL NSA
Dell SonicWALL TZ
Dell SuperMassive



Extreme Alpine (ExtremeWare)
Extreme Alpine (XOS)
Extreme BlackDiamond (XOS)
Extreme Summit (ExtremeWare)
Extreme Summit (XOS)






Fortinet Fortigate Firewalls (UTM)



Foundry Networks BigIron Switch
Foundry Networks FastIron Switch
Foundry Networks NetIron Switch
Foundry Networks ServerIron



GTA Firewall Appliances



H3C 3600 Series Switches
H3C 5500 Series Switches



HP ComWare Routers
HP JetDirect Print Servers
HP ProCurve Switches



Huawei Quidway Switches (3COM)
Huawei Routers
Huawei CX Series Routers
Huawei Eudemon Series Firewalls
Huawei NE Series Routers



IBM Proventia G Series
IBM Proventia M Series



McAfee Enterprise Firewall
McAfee Sidewinder



Forcepoint Sidewinder



Microsoft Forefront



NETGEAR ProSafe FSM Switches
NETGEAR ProSafe FVS Firewalls



Nokia IP Firewalls (Check Point)



Nortel Contivity Routers
Nortel Ethernet Routing 8k Switch
Nortel Passport 8k Switches
Nortel Switching Firewalls (CP)
Nortel VPN Routers



Palo Alto Firewalls*
Palo Alto Panorama*



Ruggedcom RuggedSwitch



Secure Computing (SecureOS 6)
Secure Computing (SecureOS 7)



SonicWALL Firewall (SonicOS)
SonicWALL NSA (SonicOS Enhanced)
SonicWALL Pro (SonicOS)
SonicWALL Pro (SonicOS Enhanced)
SonicWALL TZ (SonicOS)
SonicWALL TZ (SonicOS Enhanced)



Sophos UTM



Netfilter IP tables

*Most popular
If you have any questions or need support when auditing any devices with our tool please get in touch.

Nipper Studio Scanner Comparison

Scanner Comparison 

What is the Difference Between Nipper Studio and Scanning Based Solutions? 

It’s as simple as this. Vulnerability scanning tools mimic an attack by bombarding your device from the outside, trying to find a gap in your defenses.

Nipper Studio looks at the configuration of the actual device you are protecting. Being on the inside means that it can see all potential weaknesses, whether a scanner has located it or not. This typically offers you a much more detailed report and stops network vulnerabilities being left unmanaged. 

Using the two technologies in conjunction with each other will give you a much higher level of security than scanning tools alone. The table below highlights some of the differences:

Nipper System Requirements

System Requirements

microsoft windows

Microsoft Windows XP or above (Server 2003 or above)

  • 400MB disk space
  • 2GB memory

macOS Sierra or above

  • 500MB disk space
  • 2GB memory

GNU/Linux (RHEL, Ubuntu, Fedora, CentOS, openSuSE)

  • 300MB disk space
  • 2GB memory