Automate repetitive checklist tasks, including creation, updates, and reviews

Get software, port and vulnerability information from Nessus scans faster and easier

Work with multiple checklists at once and use custom views to provide quality results

Break free of the grind

Are you tired of wasting your time on these tasks?

  • Creating 50 checklists from SCAP results one at a time

  • Struggling to find all “Not Reviewed” items in hundreds of checklist

  • Correcting host information in your checklists one at a time

  • Trying to read information from cluttered spreadsheets

  • Copying and pasting software from a Nessus PDF to create a software list

  • Using self-made scripts and spreadsheets to create POA&Ms from checklists and Nessus data

Get Solutions

Quickly and easily view the information you need

A faster more efficient way to get things done

Many people waste valuable time and resources on repetitive tasks and time-consuming checklists. At STIG Solution, we’ve created the tools to automate core tasks so you’re more efficient.

Solutions to make you a better cyber security professional

View, analyze and create reports using .nessus files

Get NessViewer
  • View by asset-finding totals

  • Ditch the spreadsheet and use our analysis capability to group, sort, and filter nessus data and create spreadsheet reports

  • Create software reports quickly and easily, either by asset, by scan, or by all data

  • View port information, including related listeners to help identify associated software

  • Quickly and easily create Detailed Vulnerability List (DVL) and Plan of Action and Milestone (POA&M) reports, exportable to Microsoft Excel

Edit, review and analyze STIG checklists with ease

Get STIGRevolution
  • Edit status, finding details, and comments for multiple assets

  • Use our review interface to check and edit host information, check for not reviewed items, and items with no finding details

  • Ditch the spreadsheet and use our analysis capability to sort, filter, and group information

  • Create spreadsheet reports from our analysis tab

  • Execute bulk checklist actions, including creating checklists from multiple SCAP outputs, bulk update of old checklists to new versions, and bulk copies using hostname and IP lists

  • Automatically fill in finding details for closed items using default closure statements from STIG enhancements

Stop struggling to produce the data you need

We believe you want to be a better cyber security professional. In order to do that, you need a more efficient way to handle data.

The problem is the limited tools that do exist are inferior. You’re frustrated by the repetitive tasks that take up so much of your work day.

We believe you should spend your time doing the work you were hired for, not endlessly clicking through applications to produce checklists and reports. At STIG Solution, we’ve created the tools to automate these tasks.