Nipper Tabs | Titania
0
  • Overview
  • Reporting
  • Supported Devices
  • Scanner Comparison
  • System Requirements

Nipper Overview

Security that keeps you steps ahead

Harden your network infrastructure before attacks happen

 

Nipper Studio was the 1st advanced and detailed configuration auditing tool in the world. It is the configuration auditing tool of choice, for enterprise clients in 80 countries.
It helps you harden and secure vital network devices, such as Firewalls, Switches and Routers.

  • Detailed configuration reporting, gives quick, clear views of device settings.
  • Scriptable for 24/7 vulnerability alerts, 365 days a year.
  • Enhances enterprise scanning systems & removes accuracy concerns.
  • Audits against industry standards such as CIS, STIG & NIST benchmarks.
  • Our “Best Practice” security audits (combining multiple industry checks).
  • Rating systems and mitigation advice, helps you prioritize and plan fixes.
  • Automated configuration auditing is comprehensive, fast and efficient.
  • Audit systems in less time, without mass network traffic generation.
  • Simple to use. No lengthy implementation investment or roll-out required.
  • Agentless. No additional software or systems to install or maintain.
  • Audit offline, online, physical, virtual and isolated systems.
  • Tools can be scheduled, scripted and work on multiple platforms.
  • Integrates easily with existing systems.
  • Easily customize settings to suit your own policies.
  • Data outputs can be included into your current solutions.

The result?
Nipper Studio is a quick to implement, efficient and scalable tool, that users love. Perform a build review on your firewall, switch or router configurations – discover new vulnerabilities (that others might find) & harden your networks, today. Take a free trial

Nipper Reporting

Nipper Studio has a wealth of different report options to fit your auditing needs.

Whether you are striving to become compliant with an industry standard or to your own security targets, Nipper Studio’s reports can help you achieve your goal quickly and easily.

Security Audit Logo

Perform a "best practice" security audit (combining multiple industry checks). Use rating systems and mitigation advice to prioritize and plan your fixes.

Detailed configuration reporting, including information such as: filtering, routing protocols, administration services & more. This report offers a quick, clear view of your device settings.

Audit against global public vulnerability repositories such as the:
US Govt NVD (National Vulnerability Database) & the NIST CVE (Common Vulnerability and Exposures) databases. Security issues in the public domain are even easier to exploit, this report helps you quickly find and plug these holes.

The CIS (Center for Internet Security) benchmark reports, can be run against Cisco ASA & Cisco IOS Devices. These reports have been externally certified by CIS and verified as auditing against their baseline.

PCI (Payment Card Industry) audits, perform the automatable system checks and support integrating this verified data with non-automatable policy checks. Results offer detailed advice, verifying passes and explaining failures, so you can quickly become compliant. 

U.S. Military STIG compliance audit developed in conjunction with DoD IA user groups. Nipper Studio is favored by many Government and Defense agencies because reports are detailed, verifiable and include remediation in line with STIG baselines. Reports can be generated offline for secure environments and scaled up to audit any number of devices.

A compliance audit against the SANS policy documents. The SANS institute is a trusted industry body which also trains information security professionals. Their policy is a great compliance benchmark to audit against in order to assess your security level.

Nipper Studio Supported Devices

Cisco ASR (IOS XR)
Cisco Aironet (IOS)*
Cisco Aironet Wireless AP (IOS)
Cisco Catalyst Switches (CatOS)
Cisco Catalyst Switches (IOS)*
Cisco Catalyst Switches (NMP)
Cisco CRS (IOS XR)
Cisco Content Services Switches
Cisco IDS/IPS
Cisco Nexus Appliances*
Cisco Routers (IOS)*
Cisco Routers (IOS XR)
Cisco Security Appliance (ASA)*
Cisco ASA Applicance Contexts*
Cisco Security Appliance (FWSM)
Cisco Security Appliance (PIX)
Cisco PIX Appliance Contexts
Cisco Wireless LAN

Check Point IP Firewalls
Check Point Firewall Management*
Check Point Power-1 Firewalls*
Check Point VPN-1 Firewalls*
Check Point Appliance*

Juniper E Series Routers
Juniper EX Series Switches
Juniper IDP Devices
Juniper ISG Firewalls
Juniper J Series Routers
Juniper M Series Routers
Juniper MX Series Routers
Juniper NetScreen Firewalls*
Juniper SA SSL VPN (IVE)
Juniper SA SSL VPN (JunOS Pulse)
Juniper SRX Firewalls*
Juniper SSG Firewalls (JunOS)
Juniper SSG Firewalls (ScreenOS)
Juniper T Series Routers

WatchGuard 2 Series Firewalls
WatchGuard 5 Series Firewalls
WatchGuard 8 Series Firewalls
WatchGuard 1050 Firewalls
WatchGuard 2050 Firewalls
WatchGuard XTMv
WatchGuard XTM 1500*
WatchGuard XTM 2520*
WatchGuard XTM 3 Series*
WatchGuard X Core (XTM)*
WatchGuard X Edge (SS)
WatchGuard X Edge (XTM)*
WatchGuard X Peak (XTM)*

 

 

 

 

3COM 4200 Series Switches
3COM 4400 Series Switches
3COM 4500 Series Switches
3COM 5500 Series Switches
3COM SuperStack 3 Firewalls
3COM TippingPoint IDS/IPS

 

 

Alteon Switched Firewall (CP)

 

 

Arista Routing Switch

 

 

Barracuda NetContinuum

 

 

Bay Networks Accelar Switches

 

 

Blue Coat ProxySG

 

 

Brocade BigIron Switch
Brocade FastIron Switch
*
Brocade NetIron Switch
Brocade ServerIron
Brocade ICX Switch (IronWare)
*

 

 

Crossbeam Firewalls

 

 

CyberGuard Firewalls (SecureOS 6)

 

 

Dell PowerConnect J EX-Series
Dell PowerConnect J SRX
Dell PowerConnect Switches
Dell SonicWALL NSA
Dell SonicWALL TZ
Dell SuperMassive

 

 

Extreme Alpine (ExtremeWare)
Extreme Alpine (XOS)
Extreme BlackDiamond (XOS)
Extreme Summit (ExtremeWare)
Extreme Summit (XOS)

 

 

F5 BIG-IP

 

 

Fortinet Fortigate Firewalls (UTM)

 

 

Foundry Networks BigIron Switch
Foundry Networks FastIron Switch
Foundry Networks NetIron Switch
Foundry Networks ServerIron
*

 

 

GTA Firewall Appliances

 

 

H3C 3600 Series Switches
H3C 5500 Series Switches

 

 

HP ComWare Routers
HP JetDirect Print Servers
HP ProCurve Switches
*

 

 

Huawei Quidway Switches (3COM)
Huawei Routers
Huawei CX Series Routers
Huawei Eudemon Series Firewalls
Huawei NE Series Routers

 

 

IBM Proventia G Series
IBM Proventia M Series

 
 

 

McAfee Enterprise Firewall
McAfee Sidewinder

 

 

Forcepoint Sidewinder

 

 

Microsoft Forefront

 

 

NETGEAR ProSafe FSM Switches
NETGEAR ProSafe FVS Firewalls

 

 

Nokia IP Firewalls (Check Point)

 

 

Nortel Contivity Routers
Nortel Ethernet Routing 8k Switch
Nortel Passport 8k Switches
Nortel Switching Firewalls (CP)
Nortel VPN Routers

 

 

Palo Alto Firewalls*
Palo Alto Panorama*

 

 

Ruggedcom RuggedSwitch

 

 

Secure Computing (SecureOS 6)
Secure Computing (SecureOS 7)

 

 

SonicWALL Firewall (SonicOS)
SonicWALL NSA (SonicOS Enhanced)
SonicWALL Pro (SonicOS)
SonicWALL Pro (SonicOS Enhanced)
SonicWALL TZ (SonicOS)
SonicWALL TZ (SonicOS Enhanced)

 

 

Sophos UTM

 

 

Netfilter IP tables

 
*Most popular
If you have any questions or need support when auditing any devices with our tool please get in touch.

Nipper Studio Scanner Comparison

Scanner Comparison 

What is the Difference Between Nipper Studio and Scanning Based Solutions? 

It’s as simple as this. Vulnerability scanning tools mimic an attack by bombarding your device from the outside, trying to find a gap in your defenses.

Nipper Studio looks at the configuration of the actual device you are protecting. Being on the inside means that it can see all potential weaknesses, whether a scanner has located it or not. This typically offers you a much more detailed report and stops network vulnerabilities being left unmanaged. 

Using the two technologies in conjunction with each other will give you a much higher level of security than scanning tools alone. The table below highlights some of the differences:

Nipper System Requirements

System Requirements

microsoft windows

Microsoft Windows XP or above (Server 2003 or above)

  • 400MB disk space
  • 2GB memory
apple

macOS Sierra or above

  • 500MB disk space
  • 2GB memory
linux

GNU/Linux (RHEL, Ubuntu, Fedora, CentOS, openSuSE)

  • 300MB disk space
  • 2GB memory