Invicti | Company Profile - Revenue, Headcount, Tech Stack, Contacts
Contact Information
Industry & Market
Company Metrics
Funding Information
Headcount Distribution
By Department
Department Breakdown
Technology Stack
Analytics & Tracking
Social & Marketing
Video & Media
Email & Communication
Keywords & Focus Areas
Invicti
Overview
Invicti Security is a leader in web application security, based in Austin, Texas. The company specializes in dynamic application security testing (DAST) and interactive application security testing (IAST) solutions. These technologies automate vulnerability detection, reduce false positives, and streamline remediation for organizations worldwide. Invicti was formed in 2018 through the merger of Netsparker and Acunetix, both of which were pioneers in web vulnerability scanning.
The Invicti AppSec Platform includes proof-based Application Security Posture Management (ASPM) and is designed to scan entire web footprints, verify vulnerabilities automatically, and integrate into DevOps workflows. Its offerings include Netsparker, which provides enterprise-grade security for large organizations, and Acunetix, tailored for small and medium-sized businesses. The company serves a diverse range of clients, including enterprises and public sector organizations, helping them secure their web applications and APIs effectively.
Basic Information
| Industry | computer & network security |
|---|---|
| Founded | 2018 |
| Revenue | $34.3M |
| Headquarters | 1000 N Lamar Blvd, Austin, Texas 78703, United States |
| Alexa Ranking | 169476 |
Contact Details
- Website: invicti.com
- LinkedIn: linkedin.com/company/invicti-security
Key Focus Areas & Initiatives
- cybersecurity
- application security
- web application security
- api security
- dast
- sast
- iast
- aspm
- b2b
- security for regulated industries
- security products
- threat detection
- security validation processes
- vulnerability scanning
- security management tools
- security automation tools
- enterprise security
- false positive reduction
- security testing
- container security
- compliance
- application security orchestration
- security compliance
- proof-based scanning
- risk management
- security for apis and web services
- api vulnerability
- security visibility
- regulatory compliance
- security for devops pipelines
- security automation
- proof-based vulnerability validation
- security monitoring
- devops security
- security risk assessment
- security validation
- attack surface management
- vulnerability detection
- security deployment
- security integration
- runtime application security
- dynamic testing
- security posture
- ci/cd integration
- security for financial institutions
- full-stack security visibility
- cloud security
- security for cloud-native applications
- security testing tools
- security detection
- it security
- security automation workflows
- web security
- ai-driven vulnerability prioritization
- security incident response
- security solutions
- security services
- security reporting
- security prioritization
- security development
- security standards
- security alerts
- security platform
- application security platform
- financial services
- government
- ai-powered security
- devsecops
- education
- security orchestration platforms
- security for serverless architectures
- automated remediation guidance
- automation
- security tools
- cloud application security
- security compliance reporting
- security validation tools
- it & telecom
- services
- security accuracy
- security threat intelligence
- security threat detection
- sca
- healthcare
- computer systems design and related services
- security frameworks
- vulnerability management
- shadow api detection
- risk prioritization
- security remediation
- security software
- security policies
- security orchestration
- static analysis
- risk assessment
- security for government agencies
- runtime validation
- security in rapid deployment environments
- security for saas applications
- security management
- security for apis in microservices
- security workflows
- security for healthcare systems
- security for microservices
- penetration testing
- security technology
- security for containerized environments
- security innovation
- security dashboards
- security analytics
- security scalability
- security for education platforms
- dynamic application security testing (dast)
- static application security testing (sast)
- software composition analysis (sca)
- continuous security
- security integrations
- application security testing
- false positives reduction
- integrative security solutions
- predictive risk scoring
- comprehensive scanning
- security backlog management
- user access control
- asset discovery
- application scanning
- api discovery
- security collaboration
- actionable insights
- agile security practices
- web risk management
- continuous integration/continuous deployment (ci/cd) security
- port and network scanning
- configuration management
- web vulnerability scanner
- ethical hacking software
- vulnerability remediation
- security intelligence
- security awareness training
- incident response
- finance
- computer & network security
- information technology & services
- health care
- health, wellness & fitness
- hospital & health care
Technologies Used
- .NET
- AI
- Acunetix
- Ad Astra
- Amazon AWS
- Amazon SES
- Atlassian Cloud
- Azure Devops
- Bing Ads
- Bizible
- C#
- CAT
- CloudFlare Hosting
- Cloudflare DNS
- Cursor
- Docker
- DoubleClick
- DoubleClick Conversion
- Drift
- GitHub
- GitHub Copilot
- GitLab
- Gmail
- Google AdWords Conversion
- Google Apps
- Google Dynamic Remarketing
- Google Tag Manager
- Greenhouse.io
- Hotjar
- Invicti (formerly Netsparker)
- IoT
- Javascript
- Jenkins
- Linkedin Marketing Solutions
- MailChimp SPF
- Mailchimp Mandrill
- Marketo
- Microsoft Office 365
- Minteye / AdsCaptcha
- Mobile Friendly
- Mode
- Postmark
- Python
- Rackspace MailGun
- Remote
- Route 53
- Sage
- Salesforce
- Shutterstock
- Slack
- Snyk Code (SAST)
- The Trade Desk
- UptimeRobot
- Vimeo
- Visual Website Optimizer
- WordPress.org
- Yocto
- Zendesk
- Zoomdata