3COM 4200 Series Switches
3COM 4400 Series Switches
3COM 4500 Series Switches
3COM 5500 Series Switches
3COM SuperStack 3 Firewalls
3COM TippingPoint IDS/IPS
Discover misconfigured systems and firewall, switch and router vulnerabilities, effortlessly and without mass network traffic.
Try it free
Nipper Studio’s reports include manufacturer specific, mitigation advice and fixes. Meet your security targets faster or become compliant with industry standards now.
- Supported Devices
- Scanner Comparison
- System Requirements
Nipper Studio was the 1st advanced and detailed configuration auditing tool in the world. It is the configuration auditing tool of choice, for enterprise clients in 80 countries.
It helps you harden and secure vital network devices, such as Firewalls, Switches and Routers.
- Detailed configuration reporting, gives quick, clear views of device settings
- Scriptable for 24/7 vulnerability alerts, 365 days a year.
- Enhances enterprise scanning systems & removes accuracy concerns.
- Audits against industry standards such as CIS, STIG & NIST benchmarks
- Or “Best Practice” security audits (combining multiple industry checks).
- Rating systems and mitigation advice, helps you prioritize and plan fixes.
- Automated configuration auditing is comprehensive, fast and efficient.
- Audit systems in less time, without mass network traffic generation.
- Simple to use - No lengthy implementation investment or roll-out required
- Agentless. No additional software or systems to install or maintain
- Audit offline, online, physical, virtual and isolated systems
- Tools can be scheduled, scripted and work on multiple platforms
- Integrates easily with existing systems.
- Easily customize settings to suit your own policies.
- Data outputs can be included into your current solutions.
Nipper Studio is a quick to implement, efficient and scalable tool, that users love. Perform a build review on your firewall, switch or router configurations – discover new vulnerabilities (that others might find) & harden your networks, today. Take a free trial
Perform a "best practice" security audit (combining multiple industry checks). Use rating systems and mitigation advice to prioritize and plan your fixes.
Detailed Configuration Reporting, including information such as: filtering, routing protocols, administration services & more. This report offers a quick, clear view of your device settings.
Audit against global public vulnerability repositories such as the:
US Govt NVD (National Vulnerability Database) & the NIST CVE (Common Vulnerability and Exposures) databases. Security issues in the public domain are even easier to exploit, this report helps you quickly find and plug these holes.
The CIS (Center for Internet Security) benchmark reports, can be run against Cisco ASA & Cisco IOS Devices. These reports have been externally certified by CIS and verified as auditing against their baseline.
PCI (Payment Card Industry) audits, perform the automatable system checks and support integrating this verified data with non-automatable policy checks. Results offer detailed advice, verifying passes and explaining failures, so you can quickly become compliant.
U.S. Military STIG compliance audit developed in conjunction with DoD IA user groups. Nipper Studio is favored by many Government and Defense agencies because reports are detailed, verifiable and include remediation in line with STIG baselines. Reports can be generated offline for secure environments and scaled up to audit any number of devices.
A compliance audit against the SANS policy documents. The SANS institute is a trusted industry body which also trains information security professionals. Their policy is a great compliance benchmark to audit against in order to assess your security level.
Cisco ASR (IOS XR)
Cisco Aironet (IOS)*
Cisco Aironet Wireless AP (IOS)
Cisco Catalyst Switches (CatOS)
Cisco Catalyst Switches (IOS)*
Cisco Catalyst Switches (NMP)
Cisco CRS (IOS XR)
Cisco Content Services Switches
Cisco Nexus Appliances*
Cisco Routers (IOS)*
Cisco Routers (IOS XR)
Cisco Security Appliance (ASA)*
Cisco ASA Applicance Contexts*
Cisco Security Appliance (FWSM)
Cisco Security Appliance (PIX)
Cisco PIX Appliance Contexts
Cisco Wireless LAN
Check Point IP Firewalls
Check Point Firewall Management*
Check Point Power-1 Firewalls*
Check Point VPN-1 Firewalls*
Check Point Appliance*
Juniper E Series Routers
Juniper EX Series Switches
Juniper IDP Devices
Juniper ISG Firewalls
Juniper J Series Routers
Juniper M Series Routers
Juniper MX Series Routers
Juniper NetScreen Firewalls*
Juniper SA SSL VPN (IVE)
Juniper SA SSL VPN (JunOS Pulse)
Juniper SRX Firewalls*
Juniper SSG Firewalls (JunOS)
Juniper SSG Firewalls (ScreenOS)
Juniper T Series Routers
WatchGuard 2 Series Firewalls
WatchGuard 5 Series Firewalls
WatchGuard 8 Series Firewalls
WatchGuard 1050 Firewalls
WatchGuard 2050 Firewalls
WatchGuard XTM 1500*
WatchGuard XTM 2520*
WatchGuard XTM 3 Series*
WatchGuard X Core (XTM)*
WatchGuard X Edge (SS)
WatchGuard X Edge (XTM)*
WatchGuard X Peak (XTM)*
3COM 4200 Series Switches
Alteon Switched Firewall (CP)
Arista Routing Switch
Bay Networks Accelar Switches
Blue Coat ProxySG
Brocade BigIron Switch
Brocade FastIron Switch*
Brocade NetIron Switch
Brocade ICX Switch (IronWare)*
CyberGuard Firewalls (SecureOS 6)
Dell PowerConnect J EX-Series
Dell PowerConnect J SRX
Dell PowerConnect Switches
Dell SonicWALL NSA
Dell SonicWALL TZ
Extreme Alpine (ExtremeWare)
Extreme Alpine (XOS)
Extreme BlackDiamond (XOS)
Extreme Summit (ExtremeWare)
Extreme Summit (XOS)
Fortinet Fortigate Firewalls (UTM)
Foundry Networks BigIron Switch
Foundry Networks FastIron Switch
Foundry Networks NetIron Switch
Foundry Networks ServerIron*
GTA Firewall Appliances
H3C 3600 Series Switches
H3C 5500 Series Switches
HP ComWare Routers
HP JetDirect Print Servers
HP ProCurve Switches*
Huawei Quidway Switches (3COM)
Huawei CX Series Routers
Huawei Eudemon Series Firewalls
Huawei NE Series Routers
IBM Proventia G Series
IBM Proventia M Series
McAfee Enterprise Firewall
NETGEAR ProSafe FSM Switches
NETGEAR ProSafe FVS Firewalls
Nokia IP Firewalls (Check Point)
Nortel Contivity Routers
Nortel Ethernet Routing 8k Switch
Nortel Passport 8k Switches
Nortel Switching Firewalls (CP)
Nortel VPN Routers
Palo Alto Firewalls*
Palo Alto Panorama*
Secure Computing (SecureOS 6)
Secure Computing (SecureOS 7)
SonicWALL Firewall (SonicOS)
SonicWALL NSA (SonicOS Enhanced)
SonicWALL Pro (SonicOS)
SonicWALL Pro (SonicOS Enhanced)
SonicWALL TZ (SonicOS)
SonicWALL TZ (SonicOS Enhanced)
What is the Difference Between Nipper Studio and Scanning Based Solutions?
It’s a simple as this. Vulnerability scanning tools mimic an attack by bombarding your device from the outside, trying to find a gap in your defences.
Nipper Studio looks at the configuration of the actual device you are protecting. Being on the inside means that it can see all potential weaknesses, whether a scanner has located it or not. This typically offers you a much more detailed report and stops network vulnerabilities being left unmanaged.
Using the two technologies in conjunction with each other will give you a much higher level of security than scanning tools alone. The table below highlights some of the differences:
Microsoft Windows XP or above (Server 2003 or above)
Microsoft Windows 10 and Microsoft Windows Server 2012 benefit from our most advanced level of testing and support.
Mac OS X (Sierra)
GNU/Linux (RHEL, Ubuntu, Fedora, CentOS, openSuSE)