SecPoint Penetrator - VAPT - Vulnerability Scanner - Onefede
Onefede > Products > SecPoint Penetrator – VAPT

SecPoint Penetrator – VAPT

Sold by: SecPoint SKU: secpoint Categories: , ,

SecPoint Penetrator can help you to find the vulnerabilities on your entire network. You can scan your internal local IP addresses and your public IPs available on the Internet. You can scan your Websites, webapps, servers, workstations, IoT, scada etc. Find all SSL vulnarabilities. SecPoint State of the art Cyber Security and must have for every organization. SecPoint can be installed as harware appliance or virtual machine.

  1. Discover your weak points before it is too late.
  2. Ultimate Vulnerability Scanning
  3. Distributed Scanning Capability. Master / Client mode.
  4. Hardware 1U Rack or Virtual ESXi,Hyper-V,Linux Images
  5. Build in Ticket System
  6. Multiple Reporting: Consultant, Tech, Executive
  7. Multiple Report Formats: PDF, HTML & XML
  8. Not fixed on IP adresses, scan unlimited IPs, buy license for simultanous scan

Report Abuse

Description

SecPoint Penetrator can help you to find the vulnerabilities on your entire network. You can scan your internal local IP addresses and your public IPs available on the Internet. You can scan your Websites, webapps, servers, workstations, IoT, scada etc. Find all SSL vulnarabilities. SecPoint State of the art Cyber Security and must have for every organization. SecPoint can be installed as harware appliance or virtual machine.

You may find vulnerabilities automatically with the schedule scanning & get notified by email once new vulnerabilities are discovered.  PDF & HTML reports will show you the evidence of vulnerabilities and information on how to eliminate them.

SecPoint is fully featured powerful yet easy to use Vulnerability Management – Vulnerability Scanning, Assessment along with real-life pen-testing solution. SecPoint is Number 1 top rated Network Security Vulnerability Scanner, Assessment & Penetration testing solution.

Key Features
  1. No experience necessary to operate. User friendly to Setup.
  2. Performs vulnerability scanning of your public website and IPs along with your internal local IPs.
  3. 64 Bit Vulnerability Scanner High Power Support.
  4. No backdoors in product – All information at customer site – No data gathering
  5. Includes both the SecPoint vulnerability scanner and penetration tester Vulnerability Scanning Capabilities.
  6. Penetrator has an IP address. So you just need to login to the web interface and configure the IP address. You can set it on the Internal or External network and reach the Penetrator administration interface from the Internet.
  7. Secure your network with the best Vulnerability Scanner.
  8. Penetration Testing – Pentesting – Vulnerability Scanner
  9. Vulnerability Assessment Joomla Security Checker, Joomla Vulnerability Scan.
  10. Advanced Vulnerability Scanning Profiles: Normal Scan, OWASP Scan, Firewall Scan, SEO Black Hat DB Scan, Extended Scan, SANS Scan, Aggressive Scan.
  11. It comes fully loaded with Automated functionality. CVE, Bugtraq, OVSDB compliance reporting. Easy to use scanning profiles for Normal scan, Web Scan, OWASP scan, Aggressive Scan, Firewall Scan, Extended Firewall Scan

 

Additional information

concurrent IP Scan

1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024, 2048

Vendor Information

Description

SecPoint is a Danish IT security company which has developed security solutions, each ahead of it’s competitors in their markets:

The Protector has features such as High Speed Firewall and UTM capability. Best Anti Spam, Multi Engine Anti-Virus, Web Filter, HIgh Speed IPS multi core Engine.

The Penetrator has features such as Vulnerability Management, Security Assessment, Penetration Testing, Audit any OS, Distributed Audit, Launch Real Exploits, Launch Real DoS Attacks, Reports Branding and comes in Portable and fully standalone appliance versions.

The Portable Penetrator has features such as Wireless WiFi security auditing of open networks, WEP, WPA and WPA2 Protected networks. Further more it also incorporates the other features of the Penetrator such as Vulnerability Management, Security Assessment, Penetration Testing, Audit any OS, Distributed Audit, Launch Real Exploits, Launch Real DoS Attacks.

No product has been found!

Product Inquiry

Item added To cart