SecPoint Penetrator is a vulnerability scanning virtual or hardware appliance that simulates how a hacker could penetrate a given system and reveal vulnerabilities.
SecPoint Penetrator Appliance:
- All Data at Customer Location Full Privacy
- 19 Vulnerability Scan Profiles
- Powerful Artificial Intelligence Machine Learning
- Second Generation Artificial Intelligence Machine Learning
- Customizeable for report Logo, branding, Watermark, & Company Name
- Availble Virtual Appliance with Linux Images, VM Player, VMware ESXi, MS Hyper-V, & Azure
- User Friendly GUI 24/7 Fast Support
- Made in Denmark - Privacy Friendly - No backdoors or data collection.
The Penetrator™ vulnerability database consists of more than 21 years of research. The database has a total of more than 60.000 unique remote vulnerabilities to test for. This database is updated multiple times daily.
You can launch real exploits to verify that an identified vulnerability is exploitable. It is also possible to launch real Denial of Service attacks to test preproduction systems for stability.
You can connect multiple Penetrators in a distributed network. This gives many unique advantages such as:
- Centralized reporting
- Centralized vulnerability assessment
- Centralized update point
Possibility to audit different locations from a master Penetrator located in another city.
The Penetrator ™ is designed to audit any operating system or network device. It is beneficial to audit any device in the network setup to find and rectify any identified vulnerabilities before an attacker can exploit the vulnerabilities.
All Penetrators support multi-user login. This could be used to create different accounts with different targets to audit or resold as (SAAS) to your own customers.
Branding and personalisation of reports and selling them as a service is permitted.
Features:
- Security Audit Features
- Vulnerability assessment
- 60.000 + vulnerabilities
- Unlimited auditing
- No software installation
- Advanced audit options
- Launch real exploits
- Security audit any OS
- Automatic web crawl script
- OS independent interface
- SANS top 20
- Malware Detection
- Finds Cross Site Scripting, SQL Injection and Web Errors
- Automatic web crawling engine identifies known and unknown files on websites
- Finds Cross Site Scripting
- Finds SQL Injection
- Finds Web Errors
- Black Hat SEO Scanner
- Google Hack DB
- Advanced AI, Machine Learning
- Find SSL Vulnerabilities
- Heartbleed (CVE-2014-0160)
- POODLE, SSL (CVE-2014-3566)
- TLS_FALLBACK_SCSV (RFC 7507)
- SWEET32 (CVE-2016-2183, CVE-2016-6329)
- FREAK (CVE-2015-0204)
- DROWN (CVE-2016-0800, CVE-2016-0703)
- LOGJAM (CVE-2015-4000)
- CCS (CVE-2014-0224)
- Ticketbleed (CVE-2016-9244)
- Secure Renegotiation (CVE-2009-3555)
- Secure Client-Initiated Renegotiation
- CRIME, TLS (CVE-2012-4929)
- BREACH (CVE-2013-3587)
- BEAST (CVE-2011-3389)
- LUCKY13 (CVE-2013-0169)
- RC4 (CVE-2013-2566, CVE-2015-2808)
- Penetration Testing
- Launch real exploits for Windows, Unix, Routers, Firewalls and more
- Launch real denial of service attacks
- Launch distributed denial of service via distributed setup
- Distribution Security Auditing
- Security audit remote locations from a centralized point
- Centralized reporting
- Centralized data storage
- Centralized control
- Easy-to-understand Reporting
- XML PDF and HTML reports
- Reports branding allowed
- Option for syslog remote logging
- Security Audit Configuration
- Virtual host auditing
√ Audit specific ports
√ Audit specific web directories
√ Email notification when an audit is finished
- Scheduled Auditing
- Automatic scheduled auditing
- Automatic alert about new identified security vulnerabilities
- Shows new vulnerabilities discovered and compares them with old records to show the progress in the security level
- Automatic Update
- Automatic daily database updates
- Automatic firmware updates with new features and functionality
- Centralized update point
- Automatic alerts when database is expired
- Option to upload updates manually via the interface
- Scalable and Upgradeable
- All units can be upgraded for network growth via a software license
- Investment protection
- Security Scanning of
- Wordpress, Drupal, Magento, Shopify, Umraco, Joomla, Webshops
- Support & Maintenance
- One year database subscription included
- Full support included in price
- Option for instant replacement hardware
- Web-based user interface (https)
- Quick setup wizard
- Configuration backup/restore
- Email alert and logging via syslog
- Build-in diagnostic function
- Multi User Support
- Supports multiple users to login at the same time
- Individual user accounts with different audit options and IP ranges
- Individual user security level
- Admin and regular users