SecPoint Penetrator Virtual Edition (Sofware Appliance) | Simet Information Technologies Inc.

SecPoint Penetrator Virtual Edition (Sofware Appliance)

SecPoint

State of the art Cyber Security Penetrator Vulnerability Scanner can help you to find the vulnerabilities on your entire network. You can scan your internal local IP addresses and your public IPs available on the Internet. Find your vulnerabilities automatically with the schedule scanning and get notified by email once new vulnerabilities are discovered. It comes with professional PDF & HTML reporting that will show you the evidence of vulnerabilities and information on how to eliminate them.

The Penetrator combines the latest hacking and cracking tools that offers the most comprehensive penetration testing kit.

Security   Auditing  of any  Operating System  or Network   Device
The Penetrator  is designed  to audit  any opera­ ting system or network device.  It is beneficial to audit  any device  in the network setup to find and  rectify any identified vulnerabilities   before an attacker can exploit the vulnerabilities.

Vulnerability Assessment is key to any security strategy
The latest automated hacking tools can inflict damage aeross a netvvork and aeross the vvorld in a matter of hours. Understanding the potential vulnerabili¬ties vvithin your system is vital to any security strategy.

Vulnerability   Assessment
The Penetrator is a Vulnerability  Assessment and penetration  testing appliance for your network, which  comes pre­loaded  and ready­ to­use out of the  box. It is a powerful,  easy to use and  intelligent  security assessment solution.

Unique Distributed    Penetrator Capabilities
You can connect   multiple   Penetrators in a distributed  network.   This gives many  unique advantages    such as:
­ - Centralized reporting
­ - Centralized vulnerability   assessment
­ - Centralized update point
Possibility to audit different locations from  a master Penetrator located in another   city.

60.000     +Vulnerabilities
The Penetrator vulnerability  database consists of more than  12 years of research.
The database  has a total of more than  60.000
unique remote vulnerabilities to test for.
This database is updated   multiple  times daily.

 

S7 - Virtual Edition
Maximum Concurrent Scans 1 – 1024+ IPs
Maximum Cloud Users No software limit
Maximum IP Reporting in interface 10.000+ IP Reports
All Data stored locally
WiFi Pen Testing WPA WPA2 WPS
Helpdesk Ticket System
Customize Report Branding
Customize Interface Branding
Interfaces -
Local Storage 500 Gb
RAM / CPU 8 Gb / I7 Quad
Power Supply Single PS
Form Factor Rack Mount 1RU
Support & Firmware included
All data stored locally
Vulnerability Scanning
Full Linux no reboot required

* Hardware values are given for information to show the ideal values that the firmware should be installed on a system.

  • Non US based 100% Backdoor Free
  • 9 Scan Profiles, HIPAA,OWASP top 10, Prepare for PCI, Firevvall Scan and more
  • Advanced Web Cravvler - SQL Injection - XSS - SSL Vulnerabilities
  • Distributed Scanning Capability
  • Scan any OS or Netvvork device
  • Reports Branding
  • Detailed Remediesfor İdentified Vulnerabilities
  • Secure Design Ali Data Stored on Unit
  • Ticket System for full Vulnerability Management •Vulnerability Audit
  • 60.000+ Database Signatures
  • Unlimited Auditing
  • No Softvvare Installation
  • Launch DoS & DDoS attacks
  • Advanced Audit Options
  • Reports Branding
  • Option for centralized update point
  • Audits any OS
  • Automatic Web Cravvl Script Engine
  • Stand-Alone SFF or 1U Appliance
  • Multi User Support
  • Launch Real Exploits
  • Option for syslog remote logging
  • OS Independent Interface
  • Distributed Auditing

Easy-to-understand Reporting

Reports can be customised and are available as XML, PDF or HTML fileş. System vulnerabilities are categorised as either high risk, medium risk or low risk, together with name and details of each vulnerability and its remediation. The report also gives a condusion as to the overall security level of the au- dited system.An executive summary is compiled specifically for management level revievv with both text and graphical details from the audit results.

Easy to install

The Penetrator is compatible with any operating system. İt is easy to install, with minimal configuration. Installation vvizards provide for fast set up.

Scalableand Upgradeable

The Penetrator is scalable for netvvork grovvth and IPaddresses.

Distributed Audit Capability

You can setup multiple Penetrator at different locations on the internal netvvork and remotely via an encrypted secure connec- tion connect them together. This allovvs distributed auditing, configuration and reporting from a centralized point.

Launch Real Exploits and Denial of Ser­vice Attacks

You can launch real exploits to verify that an

identified vulnerability is exploitable. İt is also

possible to launch real Denial of Service attacks to test preproduction systems for stability.

 

 

 

 

 

Bu ürüne ait özellikler veritabanımızda bulunmamamktadır.

SecPoint Penetrator Cloud Edition (SaaS)

The Cloud Penetrator is a online vulnerability management and penetration testing tool to scan your online network or your Cloud. Login from anywhere and it is ready to go. It is a powerful and i ...

SecPoint Penetrator HardWare Appliance (1U Pentest Donanımı)

The Penetrator is a Vulnerability Assessment and penetration testing appliance for your network, which comes pre-loaded and readyto-use out of the box. It is a powerful, easy to use and intelligent s ...

SecPoint Penetrator HardWare Appliance (SFF Pentest Donanımı)

The Penetrator is a Vulnerability Assessment and penetration testing appliance for your network, which comes pre-loaded and readyto-use out of the box. It is a powerful, easy to use and intelligent ...

Bu ürünle ilişkili bir ürün bulunmamaktadır.