Your SlideShare is downloading. ×
SecPoint penetrator brochure
SecPoint penetrator brochure
SecPoint penetrator brochure
SecPoint penetrator brochure
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

SecPoint penetrator brochure


Published on …
SecPoint Penetrator Vulnerability Scanner
Vulnerability Scanning Appliance

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. The Penetrator Penetration Testing Appliance Best Vulnerability Scanning SEO Blackhat Scanner Launch Real Exploits www.secpoint.comPrevent Hackers from entering your server and network!Vulnerability management is key to any security strategyThe latest automated hacking tools can inflict damage across a network and across the world in a matter of minutes.Understanding the potential vulnerabilities within your system is vital to any security strategy.
  • 2. Vulnerability management is key to any security strategy Vulnerability always be one step ahead of even the most skilled Management and advanced attackers. It has no limit on the The Penetrator is a vulnerability management and amount of auditing nor limit on the number of IP penetration testing appliance for your network, addresses and is most certainly one of the strongest which comes pre-loaded and ready to go. and most comprehensive vulnerability assessment It is a powerful and intelligent security assessment solutions on the market. solution. Comprehensive and Unlimited Vulnerability Scanning With its comprehensive vulnerability database and the application of sophisticated auditing techniques, the Penetrator enables you to
  • 3. The Penetrator Penetration Testing Appliance Easy-to-understand Scalable and Upgradeable Reporting The Penetrator is scalable for network growth and Reports can be customised and are available as IP addresses. XML, PDF or HTML files. Distributed Audit System vulnerabilities are categorised as either Capability high risk, medium risk or low risk, together You can setup multiple Penetrator at different with name and details of each vulnerability and its locations on the internal network and remotely via an remediation. encrypted secure connection connect them together. The report also gives a conclusion as to the overall This allows distributed auditing, configuration and security level of the audited system. reporting from a centralized point. An executive summary is compiled specifically for Launch Real Exploits and management level review with both text and Denial of Service Attacks graphical details from the audit results. You can launch real exploits to verify that an identified vulnerability is exploitable. It is also Easy to install possible to launch real Denial of Service attacks to The Penetrator is compatible with any operating sys- test preproduction systems for stability. tem. It is easy to install, with minimal configuration. Installation wizards provide for fast set up.Features and Benefits• Vulnerability Audit • Audits any OS • OS Independent Interface• 50.000+ Database Signatures • Automatic Web Crawl Script Engine • Distributed Auditing• Unlimited Auditing • Stand-Alone SFF or 1U Appliance • XML, PDF and HTML Reports• No Software Installation • Multi User Support • Finds SQL Injection• Advanced Audit Options • Launch Real Exploits • Finds Cross Site Scripting• Reports Branding • Option for syslog remote logging • Finds Web Errors• Option for centralized update point • Launch DoS & DDoS attacks • Automatic Network Discovery
  • 4. The Penetrator Penetration Testing Appliance Penetrator Penetrator Models >> Are you ready for the next step? S100/S300/S700 S1200 S1600 S2100 1U Rack mount 1U Rack mount 1U Rack mount Height Small Form Factor Heavy-duty steel Heavy-duty steel Heavy-duty steel 180W ATX Power 250W ATX Power supply. 460W Redundant Power 460W 1+1 ATX Redundant Power Supply supply. AC / DC 90~264V AC / DC supply. AC / DC 90~264VAC Power supply full range 90~264V full range full range Environment Operating : 0°C to 40°C Operating : 0°C to 40°C Operating : 0°C to 40°C Operating : 0°C to 40°C Temperatures Storage: -20°C to 80°C Storage: -20°C to 80°C Storage: -20°C to 80°C Storage: -20°C to 80°C Operating : 0°C to 40°C 10/100/1000 10/100/1000 10/100/1000 10/100/1000 Network 10/100/1000 Storage: -20°C to 80°C Ethernet interfaces Ethernet interfaces Ethernet interfaces Ethernet interfaces Mbpsh Automatic database Yes Yes Yes Yes and software updates Centralised Reporting Vulnerability 50.000+ Intelligent Finds SQL Injection Multi User Distributed XML PDF Multiple Daily Audit Signatures Audit Cross Site Scripting Support Audit HTML Updates Automatic Crawl Launch real exploits Scans any OS Web Server Errors Reports script u Work Stations Wireless Access Points Servers u u Internet Router Bastion Firewall Internet Router Printers Internet IP Telephones DNS WWW SMTP Work Stations BRANCH OFFICES DMZ - “demilitarized zone” HEAD OFFICEInternet: Partner InformationE-mail: www.secpoint.comFor more information on Penetrator, please