SecPoint penetrator brochure
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

SecPoint penetrator brochure

  • 334 views
Uploaded on

http://www.secpoint.com/penetrator.html...

http://www.secpoint.com/penetrator.html
SecPoint Penetrator Vulnerability Scanner
Vulnerability Scanning Appliance

More in: Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
334
On Slideshare
334
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. The Penetrator Penetration Testing Appliance Best Vulnerability Scanning SEO Blackhat Scanner Launch Real Exploits www.secpoint.comPrevent Hackers from entering your server and network!Vulnerability management is key to any security strategyThe latest automated hacking tools can inflict damage across a network and across the world in a matter of minutes.Understanding the potential vulnerabilities within your system is vital to any security strategy. www.secpoint.com
  • 2. Vulnerability management is key to any security strategy Vulnerability always be one step ahead of even the most skilled Management and advanced attackers. It has no limit on the The Penetrator is a vulnerability management and amount of auditing nor limit on the number of IP penetration testing appliance for your network, addresses and is most certainly one of the strongest which comes pre-loaded and ready to go. and most comprehensive vulnerability assessment It is a powerful and intelligent security assessment solutions on the market. solution. Comprehensive and Unlimited Vulnerability Scanning With its comprehensive vulnerability database and the application of sophisticated auditing techniques, the Penetrator enables you to
  • 3. The Penetrator Penetration Testing Appliance Easy-to-understand Scalable and Upgradeable Reporting The Penetrator is scalable for network growth and Reports can be customised and are available as IP addresses. XML, PDF or HTML files. Distributed Audit System vulnerabilities are categorised as either Capability high risk, medium risk or low risk, together You can setup multiple Penetrator at different with name and details of each vulnerability and its locations on the internal network and remotely via an remediation. encrypted secure connection connect them together. The report also gives a conclusion as to the overall This allows distributed auditing, configuration and security level of the audited system. reporting from a centralized point. An executive summary is compiled specifically for Launch Real Exploits and management level review with both text and Denial of Service Attacks graphical details from the audit results. You can launch real exploits to verify that an identified vulnerability is exploitable. It is also Easy to install possible to launch real Denial of Service attacks to The Penetrator is compatible with any operating sys- test preproduction systems for stability. tem. It is easy to install, with minimal configuration. Installation wizards provide for fast set up.Features and Benefits• Vulnerability Audit • Audits any OS • OS Independent Interface• 50.000+ Database Signatures • Automatic Web Crawl Script Engine • Distributed Auditing• Unlimited Auditing • Stand-Alone SFF or 1U Appliance • XML, PDF and HTML Reports• No Software Installation • Multi User Support • Finds SQL Injection• Advanced Audit Options • Launch Real Exploits • Finds Cross Site Scripting• Reports Branding • Option for syslog remote logging • Finds Web Errors• Option for centralized update point • Launch DoS & DDoS attacks • Automatic Network Discovery www.secpoint.com
  • 4. The Penetrator Penetration Testing Appliance Penetrator Penetrator Models >> Are you ready for the next step? S100/S300/S700 S1200 S1600 S2100 1U Rack mount 1U Rack mount 1U Rack mount Height Small Form Factor Heavy-duty steel Heavy-duty steel Heavy-duty steel 180W ATX Power 250W ATX Power supply. 460W Redundant Power 460W 1+1 ATX Redundant Power Supply supply. AC / DC 90~264V AC / DC supply. AC / DC 90~264VAC Power supply full range 90~264V full range full range Environment Operating : 0°C to 40°C Operating : 0°C to 40°C Operating : 0°C to 40°C Operating : 0°C to 40°C Temperatures Storage: -20°C to 80°C Storage: -20°C to 80°C Storage: -20°C to 80°C Storage: -20°C to 80°C Operating : 0°C to 40°C 10/100/1000 10/100/1000 10/100/1000 10/100/1000 Network 10/100/1000 Storage: -20°C to 80°C Ethernet interfaces Ethernet interfaces Ethernet interfaces Ethernet interfaces Mbpsh Automatic database Yes Yes Yes Yes and software updates www.secpoint.com Centralised Reporting Vulnerability 50.000+ Intelligent Finds SQL Injection Multi User Distributed XML PDF Multiple Daily Audit Signatures Audit Cross Site Scripting Support Audit HTML Updates Automatic Crawl Launch real exploits Scans any OS Web Server Errors Reports script u Work Stations Wireless Access Points Servers u u Internet Router Bastion Firewall Internet Router Printers Internet IP Telephones DNS WWW SMTP Work Stations BRANCH OFFICES DMZ - “demilitarized zone” HEAD OFFICEInternet: www.secpoint.com Partner InformationE-mail: info@secpoint.com www.secpoint.comFor more information on Penetrator, please visitwww.secpoint.com/penetrator.html