Secpoint penetrator presentation-2010


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Secpoint penetrator presentation-2010

  1. 1. <ul><li>The Penetrator key features and sales information </li></ul>
  2. 2. Vulnerability Assessment & Penetration Testing Appliance Portable Penetration Testing & Wireless Auditing The Penetrator & The Portable Penetrator
  3. 3. <ul><li>Complete Penetration Testing </li></ul><ul><li>Complete Security solution </li></ul>Vulnerability Assessment Wireless Auditing Penetration Testing
  4. 4. <ul><li>Vulnerability Assessment </li></ul>Vulnerability Assessment <ul><li>Security Auditing. </li></ul><ul><li>43.000+ Signatures. </li></ul><ul><li>Automatic Crawl Engine to find </li></ul><ul><li>XSS, SQL Injection, Web errors. </li></ul><ul><li>Unlimited Auditing. </li></ul><ul><li>Audit any Operating System. </li></ul><ul><li>No Software Installation. </li></ul><ul><li>Multi User Account Support. </li></ul><ul><li>Distributed Auditing. </li></ul><ul><li>XML, PDF and HTML Reports. </li></ul><ul><li>Award Winning. </li></ul>
  5. 5. <ul><li>Targets off Vulnerability Assessment </li></ul>Vulnerability Assessment <ul><li>Direct Sales As a Service (SaaS). </li></ul><ul><li>Optimizing security for Web designers </li></ul><ul><li>Optimizing Security for Web shops </li></ul><ul><li>Security policy for Enterprise Users </li></ul>
  6. 6. <ul><li>Penetration Testing </li></ul><ul><li>Launch Real Exploits. </li></ul><ul><li>Launch Real Denial of Service. </li></ul><ul><li>Brute Force Password Files. </li></ul><ul><li>Crack Zip Files. </li></ul><ul><li>Protocol Ftp, Http... Bruteforce. </li></ul>Penetration Testing
  7. 7. <ul><li>Extended Penetration Testing </li></ul><ul><li>Launch Multiple Real Denial of Service attacks with Distribution setup </li></ul>Penetration Testing
  8. 8. <ul><li>Targets off Penetration Testing </li></ul><ul><li>Show proof of the Assessment </li></ul><ul><li>Optimizing Security for Financial companies like Banks. </li></ul><ul><li>Security Check before a System goes online </li></ul><ul><li>New business for new customers </li></ul><ul><li>Services for Cracking Zip Files. </li></ul>Penetration Testing
  9. 9. <ul><li>Wireless Auditing </li></ul><ul><li>Find open wifi networks with up to 300% range antenna range. </li></ul><ul><li>Find Weak Passwords. </li></ul><ul><li>Crack WEP, WPA, WPA2. </li></ul><ul><li>Guide to secure your Wireless </li></ul><ul><li>setup. </li></ul>Wireless Auditing
  10. 10. <ul><li>Targets off Wireless Auditing </li></ul><ul><li>Optimizing Security for Wifi networks </li></ul><ul><li>Security Second Option service </li></ul><ul><li>Easier replace bad Wifi products after audit. </li></ul>Wireless Auditing
  11. 11. <ul><li>The Penetrator - Unique Selling Points </li></ul><ul><li>Multi User Support </li></ul><ul><li>Sell Security Audits as a service (SAAS) </li></ul><ul><li>Launch Real Exploits, Denial of Service </li></ul><ul><li>Unlimited security audits </li></ul><ul><li>Find and crack Wireless Networks </li></ul><ul><li>43.000+ Signatures </li></ul><ul><li>Reports in PDF, HTML, XML and syslog format </li></ul><ul><li>Bruteforce and crack protocols, zip files </li></ul><ul><li>Find SQL Injection, XSS, Web Errors </li></ul><ul><li>Distributed Auditing </li></ul><ul><li>Audit any Operating System </li></ul><ul><li>No Software Installation </li></ul>
  12. 12. <ul><li>The Penetrator - Unique Selling Points </li></ul><ul><li>Easy to use </li></ul><ul><li>Can be used as Sensor with the Distributed setup </li></ul><ul><ul><li>For Local Auditing of Servers and workstations </li></ul></ul><ul><li>All Data of the audit stays on the unit so no Vendor backdoor. </li></ul>
  13. 13. Technical info
  14. 15. <ul><li>How to Sell Vulnerability Assessment? </li></ul>
  15. 16. <ul><li>Where to Sell Vulnerability Assessment? </li></ul><ul><li>As a Service (SaaS) </li></ul><ul><li>As tool for new customers </li></ul><ul><li>As tool to check own installations </li></ul><ul><li>of Firewalls, mail servers so your </li></ul><ul><li>customers don’t get hacked </li></ul>
  16. 17. <ul><li>As a Service (SaaS) </li></ul>Security SaaS maturing fast Though security delivered as SaaS is still in its early stages, companies are finding that it maximizes efficiency in personnel and budget Source: The Penetrator is the tool so we are ahead on others
  17. 18. <ul><li>As a Service (SaaS) </li></ul>On-demand applications regularly require information about users that can be used for financial fraud and identity theft. Following a predictable trend dating back to the invention of the spear, the bad guys have used every new technology to further their quest for profit, Source:
  18. 19. <ul><li>As tool for new customers </li></ul>New customers don buy if they don’t have a problem New customer don’t want to talk to you Until you show them they GOT a problem. Offer them a (free) Security Audit so they can see what the status of their network
  19. 20. <ul><li>As tool for new customers </li></ul>If the new customers see the many risks you have foundt his is right tools for a meeting and sell him a Protector
  20. 21. <ul><li>Are their more market for Vulnerability Assessment? </li></ul><ul><li>YES </li></ul><ul><li>I </li></ul><ul><li>Internet Service Providers </li></ul><ul><li>Financial customers </li></ul><ul><li>Web designers </li></ul><ul><li>Check other SaaS solutions </li></ul>
  21. 22. <ul><li>End of Penetrator Sales Training </li></ul><ul><li>Q & A </li></ul>