Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Description
SecPoint is a Danish IT security company which has developed security solutions, each ahead of it’s competitors in their markets:
The Protector has features such as High Speed Firewall and UTM capability. Best Anti Spam, Multi Engine Anti-Virus, Web Filter, HIgh Speed IPS multi core Engine.
The Penetrator has features such as Vulnerability Management, Security Assessment, Penetration Testing, Audit any OS, Distributed Audit, Launch Real Exploits, Launch Real DoS Attacks, Reports Branding and comes in Portable and fully standalone appliance versions.
The Portable Penetrator has features such as Wireless WiFi security auditing of open networks, WEP, WPA and WPA2 Protected networks. Further more it also incorporates the other features of the Penetrator such as Vulnerability Management, Security Assessment, Penetration Testing, Audit any OS, Distributed Audit, Launch Real Exploits, Launch Real DoS Attacks.