Quantification of vulnerabilities in a website using scanning

Contact an Eicra Consultant today and they will be happy to provide you with a free no-obligation consultation, to understand how we could add value to your business. We help business owners and enterprise to detects and manage internal and external vulnerabilities within your IT estate, helping you to manage your security risks, compliance and quality.

Automated Assessment

Automated testing and crawling: ensures entire web app is assessed and vulnerabilities identified reducing the risk and enticement to attack.

Manual Assessment

Lowers total cost of operations to reduce administrative overhead and automate repeatable processes and advice on data that could have been exposed due to past errors

Web Application Audit

We perform advance assessment of your application security - both manual and automated.

Protect Data

All plans include daily, full-server off-site backups. We use an enterprise-grade backup solution to take the guesswork out of data recovery.

WAF Strategy

WAF is designed to applies a set of rules to an HTTP conversation to cover common attacks such as cross-site scripting (XSS) and SQL injection .

Server Monitor

Eicra monitor server�s various services like Apache, Dns, Mail, Ftp, Pop3, Server Load, Disk Space etc and if any service stops on the server, we will login and find the cause and restart the service.


Basic Security

USD 99

Advance Security

USD 199

Compare Plan Features

  Basic Security Advanced Security
Secure /etc/passwd and /etc/group
Check and Optimize Listening Network Ports
Use Linux Security Extensions
Disable Unwanted Services and Separate Disk Partitions
Disable Unwanted SUID and SGID Binaries
Shell Fork Bomb/Memory Hog Protection
Cross-site scripting and SQL injection vulnerabilities.
Init scripts security
tmp folder(s) security
Root Logger Notification
Compiler security
Performs authenticated crawling.
Tweak PHP MySQ!L
FTP service security
Kernel, Crontab and MySQL Hardening
Host.conf and Sysctl.conf Hardening
Cross-platform antivirus software tool-kit
Network Socket Inode Validation
Enable PHP open_basedir Protection


Web and Mobile Application Security Programms

Eicra Soft Limited is the largest comprehensive pure-play provider of IT security solutions in Dhaka, Bangladesh. Our talented team of thought leaders, researchers and subject matter experts is deeply committed to helping businesses, governments and educational institutions build more successful security programs.


1. Use Secure Shell (SSH) - It�s also recommended to change default SSH 22 port number with some other higher level port number pluse allow specific users. Open the main SSH configuration file and make some following parameters to restrict users to access also disable root Login.

2. Web Server and Application Optimization - review your web server and various application processes to assess the overall efficiency and performance. secure specific applications (such as Proxy, Mail, LAMP, Database) and a few other security tools

3. Database Tuning - review your database connections and pooling scheme, configuration parameters, logs, and database indexing and retrieval. Database tuning is essential for application optimization, particularly when you expect an increase in site usage

4. Capacity Review - determine if your resource allocations are sufficient for your current and anticipated needs

5. Security Review - verify that the operating system, web server, and application services are up to date and have no vulnerabilities, investigate for breaches and security problems