Comparison

SecPortal vs Acunetix
web vulnerability scanner vs delivery workspace

Acunetix is one of the long-standing dedicated web vulnerability scanners, sold by Invicti Security as Acunetix Premium, Acunetix On-Premise, and Acunetix 360 across cloud and on-premise deployments. It is built around DAST coverage of web applications, with DeepScan crawling, IAST through the AcuSensor agent, login sequence recording for authenticated scans, and integrated network scanning through OpenVAS in higher tiers. The buyer is the internal AppSec or product security team that owns a known set of web applications. SecPortal is a different shape: scanning, manual finding entry, AI-generated reports, a branded client portal, retesting, and the engagement record live inside one workspace. This page is the side-by-side for buyers comparing a dedicated web scanner aimed at a known portfolio to a delivery workspace that scans, records, reports, and ships findings to clients or stakeholders.

No credit card required. Free plan available forever.

FeatureSecPortalAcunetix
Primary use case
Security delivery workspace with scanning, findings, AI reports, and client portal on one tenant
Dedicated web vulnerability scanner with DAST, IAST, and integrated network scanning across a known portfolio
External vulnerability scanning
16 modules
Network scanning via integrated OpenVAS in higher tiers
Authenticated web application scanning (DAST)
Interactive application security testing (IAST)
AcuSensor agent for PHP, .NET, Java
Code scanning (SAST and SCA via Semgrep)
Subdomain enumeration and external attack surface discovery
Scope-based crawling within registered targets
Domain verification before any external scan
DNS TXT or meta tag
Target ownership configured in console
Continuous scheduled scanning cadence (daily, weekly, biweekly, monthly)
Engagement model with scope, ROE, and deliverables
Client model with onboarding, contacts, and access control
Branded white-label client portal on your subdomain
AI-powered report generation (executive, technical, remediation)
Prebuilt compliance and management report PDFs
300+ finding templates with remediation guidance
Vulnerability records emitted by the scanner with remediation guidance
CVSS 3.1 vector parsing and auto-scoring
CVSS 3.1 with severity classification
Manual finding entry with full editor
Scanner result import (Nessus, Burp Suite, CSV)
Imports limited to its own scanner output and integrations
Encrypted credential vault for authenticated scans (AES-256-GCM)
Stored credentials managed inside the console
Retest workflow paired to original finding
Re-scan validates closure
Compliance framework templates
21 frameworks
Compliance reports for PCI DSS, HIPAA, ISO 27001, OWASP, NIST, and similar
Integrated invoicing and Stripe Connect payments
Activity audit trail with CSV export
Console audit logs
MFA enforcement on every workspace
Per-deployment configuration
Free plan available
Pricing model
Free, Pro, Team
Per-target annual licensing across Premium, On-Premise, and 360 tiers
Setup time
2 minutes
Target registration plus login sequence recording plus optional AcuSensor deployment
Best fit for
AppSec teams, internal security teams, product security teams, vulnerability management teams, pentest firms, MSSPs, and consultancies that scan, report, and deliver from one workspace
Internal AppSec and product security teams that want a dedicated web vulnerability scanner against a known web application portfolio

SecPortal vs Acunetix: web vulnerability scanner vs delivery workspace

Acunetix is one of the long-standing dedicated web vulnerability scanners, sold by Invicti Security as Acunetix Premium, Acunetix On-Premise, and Acunetix 360 depending on deployment. It is built around DAST coverage of web applications, with DeepScan crawling, IAST through the AcuSensor agent, login sequence recording for authenticated scans, and integrated network scanning through OpenVAS in higher tiers. The buyer model assumes an internal AppSec or product security team that owns a known set of web applications and wants the platform to keep scanning them as the surface changes.

SecPortal is a different shape. SecPortal is the security delivery and findings workspace for pentest firms, MSSPs, consultancies, AppSec teams, product security teams, vulnerability management teams, and internal security functions that run scoped engagements and ship findings to clients or stakeholders. The engagement, the scoping, the manual and scanner findings, the AI-generated report, the branded client portal, the retest, and the invoice all sit inside one workspace. If the question is whether to keep scanning a known web estate with a dedicated DAST product or to deliver assessments and findings as a recurring deliverable, this page is the side-by-side.

Where the dedicated web scanner model stops for delivery work

These are not Acunetix-specific criticisms; they are properties of a dedicated web vulnerability scanner when the buyer compares it to running scoped client engagements or shipping engagement deliverables to internal application owners on a platform built for delivery.

Built around the web application scanner, not the engagement record

Acunetix is structured around target groups, scheduled scans, and the issues those scans produce. There is no concept of a scoped engagement that opens with a kickoff, runs against a defined target list, ships a final report under a client name, schedules a retest paired to the original finding, and closes with an invoice. AppSec teams, pentest firms, MSSPs, and consultancies that hand findings to a stakeholder under a deliverable contract have to model that lifecycle outside Acunetix.

No branded client portal on your subdomain

Acunetix issues are reviewed inside the Acunetix console (Premium, On-Premise, or 360 depending on the deployment). Sharing them with a client typically means an exported PDF, a CSV, or pushing through an integration into a separate ticketing system. SecPortal ships a white-label client portal on your tenant subdomain so every finding, retest, remediation thread, and report download lives under your firm or team name rather than the vendor name.

No AI-generated narrative reports

Acunetix produces issue records with severity, CVSS reference, evidence (request and response), classification, and prebuilt compliance and management report PDFs that summarise the scan output. It does not generate engagement-shaped executive summaries, narrative technical writeups, or remediation roadmaps from a scoped finding set on demand. SecPortal uses Claude to draft those deliverables from the live engagement findings, including CVSS vectors, evidence, and severity, so the team edits a draft rather than starting from a blank page.

No native external attack surface modules outside the web application focus

Acunetix is a web vulnerability scanner with optional integrated network scanning powered by OpenVAS in higher tiers. It does not run a dedicated external attack surface workflow with subdomain enumeration, technology fingerprinting, SSL and header analysis, port discovery, and CVE correlation as separate modules wired into a single record. SecPortal runs 16 external modules covering SSL, headers, DNS, ports, subdomains, technology fingerprinting, and CVE correlation alongside its DAST coverage so the surface, the application, and the source sit on the same engagement.

No manual finding entry for non-scanner output

Acunetix is a scanner platform. Issues appear in the workspace because Acunetix detected them. A pentest also produces findings the scanner cannot detect: business logic flaws, chained exploits, manual SSRF or IDOR proofs, authentication bypasses through application-specific state, broken access control across multi-step flows. SecPortal ships a full manual finding editor with the 300+ finding template library, CVSS 3.1 vector parsing and auto-scoring, and structured evidence so non-scanner findings live on the same record as scanner output.

No invoicing or engagement billing

Acunetix is licensed per target or per scanning instance with annual commitment, and the customer is billed by Invicti Security (Acunetix's parent). There is no built-in invoicing for a firm or consultancy to bill its own clients out of the platform, no Stripe integration to collect payment, and no invoice generation tied to engagement deliverables. SecPortal ships invoicing and Stripe Connect so engagement scope and pricing become invoice line items the client can pay inside the workspace.

What SecPortal adds to the picture

Engagement-shaped workflow

Every scan, finding, retest, and report sits inside an engagement that has a client, a scope, a status, and a delivery date. The model matches the way pentest firms, MSSPs, and consultancies deliver work, and the way internal AppSec and product security teams run scoped assessment cycles for an application owner rather than a continuous DAST stream against the whole estate.

AI report generation

Generate executive summaries, full technical reports, remediation roadmaps, and compliance summaries from the engagement findings with a single click. The AI uses the workspace context: engagement scope, findings, severities, CVSS vectors, and evidence. The report becomes a draft the team edits rather than a blank page.

White-label client portal

Every workspace gets a branded client portal on its own tenant subdomain. Application owners or external clients log in to review findings, track remediation, download reports, and communicate with the team under your brand. Sharing findings does not mean exporting and emailing a scanner PDF.

Surface, application, and source on one workspace

External domain scanning runs across 16 modules covering SSL, headers, DNS, ports, subdomains, technology fingerprinting, and CVE correlation. Authenticated web scanning runs DAST behind a stored credential through cookie, bearer, basic, or form-based authentication. Code scanning runs SAST and dependency analysis through Semgrep against a connected repository. One workspace covers the perimeter, the application, and the source.

300+ finding templates with calibrated severity

A finding template library covers the recurring vulnerability classes a pentest produces: injection, access control, cryptography, configuration, authentication, business logic. Templates carry CVSS 3.1 vectors and remediation guidance so the tester edits the proof rather than rewriting the description. Severity comes from CVSS vector parsing, not from a fixed table.

Continuous monitoring inside the engagement record

Continuous monitoring schedules (daily, weekly, biweekly, monthly) run scans against verified domains and authenticated targets on the same record as the manual findings, the AI report, and the retest. Continuous coverage sits inside the engagement workflow rather than on a separate console.

Who each platform is the right fit for

Acunetix and SecPortal solve adjacent problems for different buyer shapes. The honest framing is that the right tool depends on whether the primary motion is scanning a known web application portfolio with a dedicated DAST product or shipping engagement deliverables to clients, application owners, or business stakeholders.

Acunetix fits internal AppSec teams running a scoped DAST motion

If you are an internal AppSec or product security team that wants a focused web vulnerability scanner with deep DAST coverage (DeepScan, IAST AcuSensor, login sequencing, CI/CD integration into Jenkins, Jira, GitHub, Azure DevOps), and the primary motion is repeatedly scanning a known set of web applications, Acunetix is built for that shape of work. The buyer is the AppSec team that owns the apps; the user is the engineer who triages the issue queue.

SecPortal fits firms and teams that ship findings as a deliverable

If you are a penetration testing firm, an MSSP, a consultancy, or an in-house AppSec, vulnerability management, or product security team running scoped engagements (web application pentests, vulnerability assessments, AppSec reviews, compliance audits) and handing findings to a client or a stakeholder, SecPortal is the delivery workspace. Engagement, findings, scanning, AI reports, branded portal, and invoicing live on one tenant.

When the answer is both

A team that already runs Acunetix against a known web portfolio and also runs scoped assessments that ship to application owners, business stakeholders, or external customers can keep Acunetix for its DAST coverage and use SecPortal for the delivery and reporting work. Import Acunetix output into SecPortal as a structured CSV through the bulk import workflow, then promote drafts to canonical findings on the engagement record.

How SecPortal scanning compares to Acunetix scanning

Both platforms run authenticated DAST against web applications, both gate scans on proof of ownership in some form, and both support scheduled scan cadence. Where they diverge is what surrounds the scanner. SecPortal treats scanning as one input into an engagement workflow that also includes manual findings, AI-generated reports, retests, and a deliverable. Acunetix treats web scanning as the platform itself, with deeper DAST coverage and integrations into ticketing and CI/CD as the surrounding workflow.

The external scanning feature runs 16 modules across SSL, headers, DNS, ports, subdomains, technology fingerprinting, and CVE correlation. The authenticated scanning feature adds DAST behind stored credentials through cookie, bearer, basic, or form authentication so issues that only surface inside an authenticated session do not slip past anonymous scanning. The code scanning feature runs SAST and dependency analysis through Semgrep against a repository connected via GitHub, GitLab, or Bitbucket OAuth. The continuous monitoring feature runs daily, weekly, biweekly, or monthly scans on a schedule and writes the results back to the same engagement record.

How credentials are handled before any authenticated scan

Authenticated scanning requires credentials to live somewhere durable. SecPortal stores them in an encrypted credential vault with AES-256-GCM, scoped to a verified domain. Every external scan is gated on domain verification through DNS TXT or meta tag so authorisation is provable before any module fires. The same pattern applies to authenticated scans: credentials and target must match the verified domain, and the scan-guard codes (DOMAIN_NOT_VERIFIED, CREDENTIAL_DOMAIN_MISMATCH, AUTH_NOT_ALLOWED) refuse to run when the chain of evidence does not hold.

Why delivery teams pick SecPortal over a dedicated web scanner

  • Move from a per-target web vulnerability scanner licence to a workspace that holds engagements, findings, AI reports, retests, and a branded portal on one record
  • Generate executive summaries, technical writeups, and remediation roadmaps from engagement findings rather than writing them outside the platform after every scan cycle
  • Hand application owners or clients a branded portal on your subdomain instead of an Acunetix-branded PDF or an exported CSV
  • Bring external attack surface coverage (SSL, headers, DNS, ports, subdomains, technology fingerprinting, CVE correlation) into the same workspace as authenticated DAST and code scanning
  • Capture manual findings (business logic, chained proofs, IDOR walkthroughs, authentication bypasses across multi-step flows) alongside scanner output rather than tracking them in a side document
  • Pair every retest to the original finding so the closure record holds up under audit rather than relying on the next scheduled scan to confirm the fix
  • Map findings across 21 frameworks including OWASP, ISO 27001, SOC 2, PCI DSS, NIST 800-53, NIST CSF 2.0, MITRE ATT&CK, DORA, and NIS2 from one workspace
  • Bill the engagement from the same platform with Stripe Connect rather than running invoicing in a separate accounting tool
  • Start on a free plan and pay for the seats and storage you actually use rather than committing to an annual per-target tier up front

From scan to deliverable

The output of a scanner is the beginning of a deliverable, not the end. SecPortal turns scan results into draft findings, the tester triages and validates them, the findings management layer holds the consolidated record with CVSS vectors, evidence, and remediation, and the AI reports feature generates the executive and technical narrative the recipient receives. The branded client portal is where the deliverable lands; the scanner result triage workflow covers how raw scanner output becomes a calibrated finding before it is promoted onto the canonical record.

For internal AppSec or product security teams that already run Acunetix against a known web portfolio and want to operationalise the output into engagement records and remediation tracking, the scanner-to-ticket handoff governance workflow and the remediation tracking workflow cover how scanner findings move from detection to closure with named owners, SLA tiers, and an audit trail. The importing third-party scanner results guide documents the verified Nessus, Burp Suite, and CSV import paths if the team wants to keep its existing scanner and consolidate findings on the SecPortal record.

Adjacent comparisons

If the evaluation is between Acunetix and other web vulnerability scanning, DAST, or AppSec delivery platforms, the comparisons below cover the same buying decision from different angles.

When the work is delivery, not just web scanning

Run scoped engagements, generate AI reports, and ship findings through a branded portal on one workspace. Web DAST sits inside the workflow, not above it. Start free.

No credit card required. Free plan available forever.