You can integrate Acunetix not only with issue trackers and CI/CD software but with many other systems. You can use data from many other applications to seed your Acunetix scans and you can also use Acunetix scan results in other applications.
Importing Data into Acunetix
You can import data into Acunetix to use it before crawling the target application. In most cases, this is not necessary but sometimes parts of the web application are not linked or otherwise hidden from crawlers. You can import crawl data from the following applications and in the following formats:- Web browser automation tools: Selenium
- Security testing proxies: Telerik Fiddler, Postman, Burp
- RESTful API definition languages: Swagger 2.0 and 3.0, and WADL
- SOAP API Definition Languages: WSDL
- ASP.NET Web Forms project files, HTTP archives (HAR), or simple text files with a list of URLs
Exporting Data from Acunetix
You can export the Acunetix scan results to be used directly as web application firewall (WAF) rules. This allows you to temporarily prevent attackers from exploiting high-severity vulnerabilities until you are able to fix them. You can export data that can be used directly by the following WAFs:- Imperva SecureSphere
- F5 BIG-IP Application Security Manager
- Fortinet FortiWeb
- Citrix Web Application Firewall
Working with the Acunetix API
In addition to import and export capabilities and easy-to-configure integrations, all Acunetix capabilities are available using a RESTful API. Using the API, you can access all the product features: manage targets, run scans, get scan results, get vulnerability details, and more. Using the API, you can integrate Acunetix with any other system in your environment. In the case of enterprise customers, Acunetix experts can help to build integration and/or provide custom options.Recommended reading
Learn more about prominent vulnerabilities, keep up with recent product updates, and catch the latest news from Acunetix.
“We use Acunetix as part of our Security in the SDLC and to test code in DEV and SIT before being promoted to Production.”
Kurt Zanzi, Xerox CA-MMIS Information Securtiy Office, Xerox