uses cookies to make interactions with the Company’s Websites easy and meaningful. When you visit one of the Company’s Websites,’s servers send a cookie to your computer. Standing alone, cookies do not personally identify you; they merely recognize your Web browser. Unless you choose to identify yourself to, either by responding to a promotional offer, opening an account, or filling out a Web form (such as a “Contact Us” or a “Free Trial” Web form), you remain anonymous to the Company. Please go to our privacy statement for details.


Importing Vulnerability Scanner Results into Unified VRM

One of the most important aspects of every complex system is flexibility. Flexibility of adapting to changing circumstances and leveraging existing investments in technology solutions.

The architecture of Unified VRM was designed with flexibility as a primary consideration. It not only has the capability to perform native scans on a wide variety of assets (external, internal, configuration, web application, wireless and more to come) but it also has the flexibility to import scan results from external scanners.

Unified VRM has a capability to natively import external and internal scanner results of Qualys, Rapid7 Nexpose and Tenable Nessus. Once the scans are imported into the database, they are like all scan result data pushed into our Artificial Intelligence Expert System for data cleansing, correlation, and prioritization. At the end of the day, there is no difference between generated scan results and imported scan results in terms of data analysis.

Updated image coming soon

Recently, we expanded the capabilities to include importing vulnerability data into the Unified VRM web application module. The users can now import BurpSuite, W3af and Skipfish web application scan data in XML format into Unified VRM. This adds great flexibility for those web application technologies that are notoriously scan-proof such as Javascript and Flash.


Our customers report huge benefits to the flexibility provided by Unified VRM. Not only does it offer the ability to leverage existing technology investments, it makes those prior investments even more valuable. When it comes to vulnerability management, having more input data that is aggregated, filtered, and prioritized means that customers receive a more comprehensive picture of the vulnerabilities that matter most. Not only does this result in faster and more efficient remediation of security threats, but it also delivers insight for better decision-making.

There is no better way to learn how you can leverage your existing vulnerability scanner investments than seeing Unified VRM in action. Get a personalized demo of how Unified VRM can help you proactively manage IT security.

Schedule a Product Demo Today!

See how NopSec's end-to-end Cyber Exposure Management platform can organize your security chaos.