
Audit every device accurately, every time
Analyzing the configurations and interactions of your network infrastructure with the expertize of a skilled penetration tester – Nipper’s unrivaled accuracy can save Network Administrators up to 3 hours per audit, per device. Instead of spending time investigating false positives of non-compliance, Nipper enables you to dedicate your valuable resources to analyzing and prioritizing fixes by providing:
Visibility of actual network vulnerabilities including existing false-negatives
Significantly fewer false-positives to investigate
Automated risk prioritization
Precise remediation with exact technical fixes
Flexible, configurable easy to read reports
Accurate reporting
- Easy to read reports written in plain English
- Machine consumable outputs for autonomous mitigation
Scheduling and integration
- Audit scheduling (with re-audit function)
- Inbuilt redaction
- SIEM integration
Customized auditing
- Device configuration audit
- Security audit
- Vulnerability audit
- Compliance audits
Risk prioritization
- Mitigation classification table
- Customizable CVSS rating
Remediation advice
- Exact technical fixes
- Typical 'time to fix'
Supported Devices
For specific details on Nipper's support for vendor's products, models and versions, please either or request a trial.

Cisco

Fortinet

Palo Alto Networks

Check Point

3COM

Alteon Networks

Barracuda

Bay Networks

Blue Coat

Brocade

Crossbeam

CyberGuard

Dell

Extreme Networks

F5

Foundry Networks

Forcepoint

Global Technology Associates

H3C

HP ProCurve Network

Huawei

IBM

Juniper Networks

McAfee

Microsoft

Netfilter

NETGEAR

Nokia

Nortel

Ruggedcom

Secure Computing

SonicWALL

Sophos

Watchguard
Below are the basic system requirements needed to operate Nipper

Microsoft Windows 7 or above (Server 2012 or above)
600MB disk space
4GB memory

GNU/Linux (Ubuntu, CentOS)
300MB disk space
2GB memory