Nipper Studio | Titania
0

Product Features

anvil

Harden Your Network

Close the Holes that Leave You Vulnerable 

Brain

Know Your Risks

"The worlds most detailed configuration auditing tools" 

clock

"Nipper enables Cisco to test devices in a fraction of the time"

Cisco Systems Inc. 

calculator

Great Value

Hard on Vulnerabilities; Easy on Your Budget

Report

Flexible Reporting

Adaptable Content & Powerful Export Options

A Team Player

Standalone or Integrate with Other Tools & Solutions

Product Details

About Nipper Tab

Security that keeps you steps ahead

Harden your network infrastructure against attacks before they happen

  • Identify exploitable vulnerabilities you might otherwise miss
  • Harden your network infrastructure
  • Become compliant with industry standards
  • Produce comprehensive reports in seconds

Nipper Studio is one of the most advanced and detailed configuration auditing tools in the world. Its reports will help you harden and secure your essential network devices, such as Firewalls, Switches and Routers.

Not just another scanning tool, Nipper Studio looks at the actual configuration of your device. With access to the inner workings, Nipper can produce a much more detailed analysis of its vulnerabilities. Within seconds, it pulls this into an easy to understand report which highlights all the potential weak spots and how to fix them.

The result? You have a clear and comprehensive understanding of what you need to do to harden your network infrastructure against attack.

The configuration auditing tool of choice for organizations in over 65 countries

  • Easily customize settings to suit your own policies
  • Audit against pre-defined best practice policies
  • Become compliant with industry standards

Nipper Studio is perfect for either one-off auditing or continuous monitoring of your network devices. There’s no limit to the amount of times you can audit a device and our licensing model and per device pricing means that your license can grow with you. Nipper Studio can scale to fit your network, no matter the size.

The tool can be downloaded and installed in minutes. Multiple activation also means that it can be easily shared between an auditing team and used at multiple sites. 

System Requirements

System Requirements

microsoft windows

Microsoft Windows XP or above (Server 2003 or above)

  • 400MB disk space
  • 2GB memory
apple

macOS Sierra or above

  • 500MB disk space
  • 2GB memory
linux

GNU/Linux (RHEL, Ubuntu, Fedora, CentOS, openSuSE)

  • 300MB disk space
  • 2GB memory

Overview

why

Do you want to harden your network infrastructure against attack, become compliant with an industry standard, unify your device output and identify exploitable vulnerabilities that you’d otherwise miss?
If so, Nipper Studio’s reports can quickly and easily help you achieve those goals!

“Nipper Studio allows us to automate much of the review process, giving a massive time saving without compromising the quality and accuracy of our results.” First Base Technologies

what

Nipper Studio is one of the most advanced and detailed configuration auditing tools in the world and is used to harden and secure your essential network devices such as Firewalls, Switches and Routers. 

“This is a must-have tool for every information security professional.” Advanced Information Solutions Inc. 

how

Unlike scanning based solutions Nipper Studio looks at the actual configuration of the device. This means that the tool has access to the inner workings of the device and can therefore produce a much more detailed analysis of its vulnerabilities.  Nipper Studio then writes up its findings into an easy to understand report which highlights all the potential vulnerabilities and how to fix them. 

who

Because of its flexibility Nipper Studio is the configuration auditing tool of choice for organizations in over 65 countries across a range of industries. Settings are easily customizable to suit your policy, or you can get started by auditing against one of our pre-defined best practice policies (see "Reporting" for more information).  

“The results begin simply enough to submit to a C-level executive, yet end complexly enough to submit to an IT professional. It is a permanent part of our auditing and security toolset." 7G Technologies

when

Perfect for either one off auditing or continuous monitoring of your network devices, there is no limit to the amount of times you can audit a device. Our licensing model and per device pricing means that your license can grow with you and scales to fit your network, no matter the size.  

where

Choose from either an auditor or enterprise license depending on if you are running the software in house or on behalf of a client.  The tool can be downloaded and installed in minutes and multiple activation means that it can be easily shared between an auditing team and used at multiple sites. 

“Using Nipper Studio has helped us to exceed our clients’ expectations from both a technical and business perspective” Relay Security 

 

Reporting

Nipper Studio has a wealth of different report options to fit your auditing needs. Whether you are striving to become compliant with an industry standard or to your own security targets, Nipper Studio’s reports can help you achieve your goal quickly and easily.

Security Audit

Perform a "best practice" security audit that combines checks from various industry sources. Use rating system and mitigation advice to prioritize and plan your fixes. 

Configuration Audit

A detailed report showing how the device has been configured. If you want a quick and clear view of your current device settings then this report offers that to you.  

Vulnerability Audit

This report details publically known software vulnerabilities against the National Vulnerability Database. Once security issues are in the public domain they are even easier to exploit, this report will help you find and plug these holes.

PCI DSS

This is an audit against the Payment Card Industry standard. If you need to comply to this standard the report will document the automatable checks, explain where and why you have passed or failed and offer advice so you can quickly become compliant. 

DISA STIG

This is a compliance audit against the U.S. Military STIG Checklist. Nipper Studio is favoured by many Government and Defense agencies because reports can be generated securely offline and scaled up to audit any number of devices. 

SANS 

A compliance audit against the SANS policy documents. The SANS institute is a trusted industry body which also trains information security professionals. Their policy is a great compliance benchmark to audit against in order to assess your security level. 

 

Scanner Comparison

Scanner Comparison 

What is the Difference Between Nipper Studio and Scanning Based Solutions? 

It’s as simple as this. Vulnerability scanning tools mimic an attack by bombarding your device from the outside, trying to find a gap in your defenses.

Nipper Studio looks at the configuration of the actual device you are protecting. Being on the inside means that it can see all potential weaknesses, whether a scanner has located it or not. This typically offers you a much more detailed report and stops network vulnerabilities being left unmanaged. 

Using the two technologies in conjunction with each other will give you a much higher level of security than scanning tools alone. The table below highlights some of the differences:

Licensing

Nipper Studio’s licensing is simple and flexible to suit your network auditing requirements. Plus our per device pricing means that your license can grow with you and scales to fit your network, no matter the size.

Our customers find it perfect for:

  • One Off Auditing - for time saving and enhanced reporting during Penetration Test configuration reviews

  • Ad Hoc Reporting as and when you choose - e.g. when configuration changes happen

  • Continual Auditing - by using the command line scripting options

Flexible Per-Device Licensing

Our per-device licensing model means that you can choose a package to suit the size of your network. You can purchase any number of devices (from our starter pack upwards) and add extra devices as your network grows.

Devices (physical or virtual) are allocated to your licenses when the device is first audited, then you can audit this device as many times as you like during your subscription.

So if you purchased a 100 device license you could audit a total of 100 different devices throughout the year. It’s that simple!

Subscription

Nipper Studio is licensed by a 1, 2 or 3 year subscription.

With multiple year subscriptions the License Key is re-set at the start of each subscription year (so you can audit different devices in years 2 & 3). You can also benefit from license cost savings for multiple year subscriptions (to see pricing options scroll to the bottom of the page).

Types of License

We have two types of license model, Enterprise and Auditor, and the pricing is the same for both. Just let us know which one suits you best.

Enterprise License

This is for auditing your own networks, or for the provision of managed services e.g. subsidiary companies.

Auditor License

This license is for use when auditing third party owned systems (with their permission) e.g. Penetration Test reviews or external companies.

Free Trial

We also offer a free, non-commercial free trial License. With this license you can audit 2 devices over a 30 day period so that you can be sure that Nipper Studio is right for you.

Supported Devices & System Requirements

System Requirements

microsoft windows

Microsoft Windows XP or above (Server 2003 or above)

  • 400MB disk space
  • 2GB memory
mac

macOS Sierra or above

  • 500MB disk space
  • 2GB memory
linux

GNU/Linux (RHEL, Ubuntu, Fedora, CentOS, openSuSE)

  • 300MB disk space
  • 2GB memory

 

Supported Devices

Cisco ASR (IOS XR)
Cisco Aironet (IOS)*
Cisco Aironet Wireless AP (IOS)
Cisco Catalyst Switches (CatOS)
Cisco Catalyst Switches (IOS)*
Cisco Catalyst Switches (NMP)
Cisco CRS (IOS XR)
Cisco Content Services Switches
Cisco IDS/IPS
Cisco Nexus Appliances*
Cisco Routers (IOS)*
Cisco Routers (IOS XE)
Cisco Routers (IOS XR)
Cisco Security Appliance (ASA)*
Cisco ASA Applicance Contexts*
Cisco Security Appliance (FWSM)
Cisco Security Appliance (PIX)
Cisco PIX Appliance Contexts
Cisco Wireless LAN

Check Point IP Firewalls
Check Point Firewall Management*
Check Point Power-1 Firewalls*
Check Point VPN-1 Firewalls*
Check Point Appliance*

Juniper E Series Routers
Juniper EX Series Switches
Juniper IDP Devices
Juniper ISG Firewalls
Juniper J Series Routers
Juniper M Series Routers
Juniper MX Series Routers
Juniper NetScreen Firewalls*
Juniper SA SSL VPN (IVE)
Juniper SA SSL VPN (JunOS Pulse)
Juniper SRX Firewalls*
Juniper SSG Firewalls (JunOS)
Juniper SSG Firewalls (ScreenOS)
Juniper T Series Routers

WatchGuard 2 Series Firewalls
WatchGuard 5 Series Firewalls
WatchGuard 8 Series Firewalls
WatchGuard 1050 Firewalls
WatchGuard 2050 Firewalls
WatchGuard XTMv
WatchGuard XTM 1500*
WatchGuard XTM 2520*
WatchGuard XTM 3 Series*
WatchGuard X Core (XTM)*
WatchGuard X Edge (SS)
WatchGuard X Edge (XTM)*
WatchGuard X Peak (XTM)*

 

 

 

 

3COM 4200 Series Switches
3COM 4400 Series Switches
3COM 4500 Series Switches
3COM 5500 Series Switches
3COM SuperStack 3 Firewalls
3COM TippingPoint IDS/IPS

 

 

Alteon Switched Firewall (CP)

 

 

Arista Routing Switch

 

 

Barracuda NetContinuum

 

 

Bay Networks Accelar Switches

 

 

Blue Coat ProxySG

 

 

Brocade BigIron Switch
Brocade FastIron Switch
*
Brocade NetIron Switch
Brocade ServerIron
Brocade ICX Switch (IronWare)
*

 

 

Crossbeam Firewalls

 

 

CyberGuard Firewalls (SecureOS 6)

 

 

Dell PowerConnect J EX-Series
Dell PowerConnect J SRX
Dell PowerConnect Switches
Dell SonicWALL NSA
Dell SonicWALL TZ
Dell SuperMassive

 

 

Extreme Alpine (ExtremeWare)
Extreme Alpine (XOS)
Extreme BlackDiamond (XOS)
Extreme Summit (ExtremeWare)
Extreme Summit (XOS)

 

 

F5 BIG-IP

 

 

Fortinet Fortigate Firewalls

 

 

Foundry Networks BigIron Switch
Foundry Networks FastIron Switch
Foundry Networks NetIron Switch
Foundry Networks ServerIron
*

 

 

GTA Firewall Appliances

 

 

H3C 3600 Series Switches
H3C 5500 Series Switches

 

 

HP ComWare Routers
HP JetDirect Print Servers
HP ProCurve Switches
*

 

 

Huawei Quidway Switches (3COM)
Huawei Routers
Huawei CX Series Routers
Huawei Eudemon Series Firewalls
Huawei NE Series Routers

 

 

IBM Proventia G Series
IBM Proventia M Series

 
 

 

McAfee Enterprise Firewall
McAfee Sidewinder

 

 

Forcepoint Sidewinder

 

 

Microsoft Forefront

 

 

NETGEAR ProSafe FSM Switches
NETGEAR ProSafe FVS Firewalls

 

 

Nokia IP Firewalls (Check Point)

 

 

Nortel Contivity Routers
Nortel Ethernet Routing 8k Switch
Nortel Passport 8k Switches
Nortel Switching Firewalls (CP)
Nortel VPN Routers

 

 

Palo Alto Firewalls*
Palo Alto Panorama*

 

 

Ruggedcom RuggedSwitch

 

 

Secure Computing (SecureOS 6)
Secure Computing (SecureOS 7)

 

 

SonicWALL Firewall (SonicOS)
SonicWALL NSA (SonicOS Enhanced)
SonicWALL Pro (SonicOS)
SonicWALL Pro (SonicOS Enhanced)
SonicWALL TZ (SonicOS)
SonicWALL TZ (SonicOS Enhanced)

 

 

Sophos UTM

 
*Most popular
If you have any questions or need support when auditing any devices with our tool please get in touch.

Supported Devices & System Requirements

Supported Devices

 

Cisco ASR (IOS XR)
Cisco Aironet (IOS)*
Cisco Aironet Wireless AP (IOS)
Cisco Catalyst Switches (CatOS)
Cisco Catalyst Switches (IOS)*
Cisco Catalyst Switches (NMP)
Cisco CRS (IOS XR)
Cisco Content Services Switches
Cisco IDS/IPS
Cisco Nexus Appliances*
Cisco Routers (IOS)*
Cisco Routers (IOS XE)
Cisco Routers (IOS XR)
Cisco Security Appliance (ASA)*
Cisco ASA Applicance Contexts*
Cisco Security Appliance (FWSM)
Cisco Security Appliance (PIX)
Cisco PIX Appliance Contexts
Cisco Wireless LAN

Juniper E Series Routers
Juniper EX Series Switches
Juniper IDP Devices
Juniper ISG Firewalls
Juniper J Series Routers
Juniper M Series Routers
Juniper MX Series Routers
Juniper NetScreen Firewalls*
Juniper SA SSL VPN (IVE)
Juniper SA SSL VPN (JunOS Pulse)
Juniper SRX Firewalls*
Juniper SSG Firewalls (JunOS)
Juniper SSG Firewalls (ScreenOS)
Juniper T Series Routers

WatchGuard 2 Series Firewalls
WatchGuard 5 Series Firewalls
WatchGuard 8 Series Firewalls
WatchGuard 1050 Firewalls
WatchGuard 2050 Firewalls
WatchGuard XTMv
WatchGuard XTM 1500*
WatchGuard XTM 2520*
WatchGuard XTM 3 Series*
WatchGuard X Core (XTM)*
WatchGuard X Edge (SS)
WatchGuard X Edge (XTM)*
WatchGuard X Peak (XTM)*

Check Point IP Firewalls
Check Point Firewall Management*
Check Point Power-1 Firewalls*
Check Point VPN-1 Firewalls*
Check Point Appliance*

 

 

3COM 4200 Series Switches
3COM 4400 Series Switches
3COM 4500 Series Switches
3COM 5500 Series Switches
3COM SuperStack 3 Firewalls
3COM TippingPoint IDS/IPS

Alteon Switched Firewall (CP)

Arista Routing Switch

Barracuda NetContinuum

Bay Networks Accelar Switches

Blue Coat ProxySG

Brocade BigIron Switch
Brocade FastIron Switch
*
Brocade NetIron Switch
Brocade ServerIron
Brocade ICX Switch (IronWare)
*

Crossbeam Firewalls

CyberGuard Firewalls (SecureOS 6)

Dell PowerConnect J EX-Series
Dell PowerConnect J SRX
Dell PowerConnect Switches
Dell SonicWALL NSA
Dell SonicWALL TZ
Dell SuperMassive

Extreme Alpine (ExtremeWare)
Extreme Alpine (XOS)
Extreme BlackDiamond (XOS)
Extreme Summit (ExtremeWare)
Extreme Summit (XOS)

F5 BIG-IP

Forcepoint Sidewinder

Fortinet Fortigate Firewalls

Foundry Networks BigIron Switch
Foundry Networks FastIron Switch
Foundry Networks NetIron Switch
Foundry Networks ServerIron
*

GTA Firewall Appliances

H3C 3600 Series Switches
H3C 5500 Series Switches

HP ComWare Routers
HP JetDirect Print Servers
HP ProCurve Switches
*

Huawei Quidway Switches (3COM)
Huawei Routers
Huawei CX Series Routers
Huawei Eudemon Series Firewalls
Huawei NE Series Routers

IBM Proventia G Series
IBM Proventia M Series

 

McAfee Enterprise Firewall
McAfee Sidewinder

Microsoft Forefront

Netfilter IPtables

NETGEAR ProSafe FSM Switches
NETGEAR ProSafe FVS Firewalls

Nokia IP Firewalls (Check Point)

Nortel Contivity Routers
Nortel Ethernet Routing 8k Switch
Nortel Passport 8k Switches
Nortel Switching Firewalls (CP)
Nortel VPN Routers

Palo Alto Firewalls*
Palo Alto Panorama*

Ruggedcom RuggedSwitch

Secure Computing (SecureOS 6)
Secure Computing (SecureOS 7)

SonicWALL Firewall (SonicOS)
SonicWALL NSA (SonicOS Enhanced)
SonicWALL Pro (SonicOS)
SonicWALL Pro (SonicOS Enhanced)
SonicWALL TZ (SonicOS)
SonicWALL TZ (SonicOS Enhanced)

Sophos UTM

*Most popular

If you have any questions or need support when auditing any devices with our tool please get in touch.

Pricing Options

$41.80
0%
$1,045.00

Ready to proceed?

No problem, we offer a completely free no obligation trial, or for alternative device options please request a quote and one of our team will be in contact shortly.

Request Quote Start Trial

Resources & Bonus Content