Invicti Consultant Edition at a glance
Single-user Invicti Standard license for dedicated external security consultants and penetration testers. Limited to 1 desktop installation. No limit to the number of scanned websites. Maximum 3 concurrent scans with queuing functionality.


3600+ Top Organizations Trust Invicti
What is Invicti Consultant Edition?
Invicti Consultant is a special single-user license for Invicti Standard. It is installed on a single machine only (usually a laptop for mobility) and may be used to scan an unlimited number of external websites and web applications. The user can run a maximum of 3 concurrent scans and queued scans can be started automatically. The license does not include any of Invicti’s automation or integration features available in the Team and Enterprise editions.

How can Invicti Consultant edition be used?
Invicti Consultant is intended for customers who perform security testing services and scan multiple external websites, with the scan targets changing over time. The typical Invicti Consultant usage scenario is one person with one machine scanning any number of websites for a variety of external clients.

Who can apply for an Invicti Consultant License?
Invicti Consultant licenses are for independent consultants and companies that offer security services as their main business, including security consulting, vulnerability assessments, and penetration testing. To qualify, customers must demonstrate that the license will be used to perform security services for external clients with no relation to the individual or company. For example, the company website should make it clear that security consultancy, penetration testing, or similar services are the primary lines of business.

Who is not eligible for an Invicti Consultant License?
Invicti Consultant licenses may not be used if the end-user performs security services for any kind of related entity. This includes in-house security services as well as services between affiliated entities, for example in parent/child companies, companies formed through a merger or acquisition, internal departments operating as separate companies, technology alliances, and State, Local and Education (SLED) systems, networks or communities.

The only DAST that validates findings with proof-based scanning.
