Wifi Password Recovery - UTM - Vulnerability Scanning

WEB SHOP
CLOUD SCAN
VIP
Sun Sun Sun

You are here: Products > Penetrator

Penetrator™ Vulnerability Scanner - Vulnerability Scanning Appliance

Reveal vulnerabilities across your network

Vulnerability Management - Vulnerability Assessent.

 No experience necessary. Easy to Setup.

Scans both public and local IP addresses.
Discover vulnerabilities in Firewalls, Routers, Windows, Linux,
MAC, Mobile devices, Printers and any device with an IP address.

Customizable PDF reporting that allows logo and name integration.

Cloud support allows for individual user management.

With Penetrator Vulnerability Scanning Appliance you can deploy it in your network and do Vulnerability Management.

You can scan Local and Public IP addresses. You will get detailed reporting in PDF,HTML or XML.

It contains clear solutions for the identified vulnerabilities.

You can easily setup scheduling and get notification once new vulnerabilities gets discovered.

Vulnerability Scanner - Vulnerability Management 

FREE World Wide Shipping

vulnerability scanning Penetrator Brochure  vulnerability scanning Penetrator Datasheet

Do you have a sample Report?

Yes, please Download Sample Vulnerability Scan Report.

You can also Download Sample Vulnerability Scan Summary Report. 

You can also deploy the Penetrator Vulnerability Scanneras a Microsoft Hyper-V 2.0 or 3.0 Image. Works for Hyper-V 2008 and earlier
Also works on Hyper-V 2012 R2 and newer.

vulnerability scanning

cloud web vulnerability scanner Pentest Magazine Review

 

Virtual Support for:

Penetrator - Vulnerability Scanner - Vulnerability Management

Do You Know If Your Networks Are Secure?
Prevent Hackers from entering your servers and network.

Penetration Testing - Pentesting , Vulnerability Scanner, Vulnerability Assessment

You get the following benefits:

vulnerability scanner Identify Vulnerabilities . vulnerability scanner A solution to fix the found vulnerabilities.
vulnerability scanner Secure Design. vulnerability scanner All Data on Disk. Joomla Scan
vulnerability scanner No remote interaction. vulnerability scanner Automated Vulnerability Scanning.
vulnerability assessment Vulnerability Scanning Pen Testing. vulnerability scanner Application Security Vulnerability.
vulnerability scanner PDF Reports vulnerability scanner Clear Solutions with fixes.
vulnerability scanner User Friendly and easy to install. vulnerability scanner Denial of Service - DoS, DDoS Tests.
vulnerability scanner Application Security. vulnerability scanner SaaS Software as a Service.
   

 

vulnerability scanning appliance

 

You can choose following Scanning Profiles: Normal Scan, Firewall Scan, Extended Scan, OWASP Scan, SANS Scan, SEO Black Hat DB Scan,Aggressive Scan.
Easy Vulnerability Management of your internal and external networks.

Best Easy to Use On Demand Vulnerability Management.

Best Comprehensive Web Scanning.

Complete Vulnerability Management and Web Vulnerability Scanning.

SecPoint Penetrator Presentation Videos 

SecPoint Penetrator Tech Videos


Features

Penetrator S800

Penetrator S1400

Penetrator S1800

 

Penetrator S2200

Dimensions

1U Rack Mount Heady-duty Steel

Chassis Dimension: 426mm x 365mm x 44mm

Carton Dimension: 560mm x 570mm x 190mm

1U Rack Mount Heady-duty Steel

Chassis Dimension: 426mm x 365mm x 44mm

Carton Dimension: 560mm x 570mm x 190mm

1U Rack Mount Heady-duty Steel

Chassis Dimension: 426mm x 365mm x 44mm

Carton Dimension: 560mm x 570mm x 190mm

1U Rack mount Heavy-duty steel

Chassis Dimension: 88mm x 430mm x 579.8mm

Carton Dimension: 640mm x 800mm x 310mm

Weight 

Without packing: 6.5kg

With packing: 10kg

Without packing: 6.5kg

With packing: 10kg 

Without packing: 6.5kg

With packing: 10kg

Without packing: 19kg

With packing: 25kg

Distributed Scanning Yes  Yes Yes Yes

Max IP Scanning 

1-32 IPs 

1-128 IPs

1-256 IPs 1-1024 IPs
Launch DoS and Profile scanning Yes

Yes

Yes Yes

Power Supply 

200W ATX Power Supply

AC/DC90~264V full range 

200W ATX Power Supply

AC/DC90~264V full range

200W ATX Power Supply

AC/DC90~264V full range

460W 1+1 ATX Redundant Power supply.

AC / DC 90~264V full range 

Network Mbps 10/100/1000 Ethernet interfaces 10/100/1000 Ethernet interface 10/100/1000 Ethernet interfaces 10/100/1000 Ethernet interfaces
Failover Support No No Yes Yes
Dual Processor No No Yes Yes
Certifications

CE approval ŒŒ

FCC Class A

ŒŒUL

CE approval ŒŒ

FCC Class A

ŒŒUL

CE approval ŒŒ

FCC Class A

ŒŒUL

CE approval ŒŒ

FCC Class A

ŒŒUL

Redundant Disk

No No Yes Yes

 

Full Scanning of vulnerabilities in: Wordpress, Drupal, Joomla,Magento,Shopify,Umbraco.

Do you know if your installation is wrongly configured or have applied the latest patches?

Full scanning included in Penetrator, Cloud Penetrator and Portable Penetrator.

  

   

 

SecPoint delivers the best Vulnerability Scanning Appliances. 

Secure your network with the best Vulnerability Scanner. 

Penetrator Vulnerability Scanner Software version cost from

 Hyper V

Penetration Testing - Pentesting

Vulnerability Scanner

Vulnerability Assessment 

Joomla Security Checker, Joomla Vulnerability Scan

web vulnerability scanner WAS,Web Application Scanning

web vulnerability scanner Google Hack Database

 Google Safe Browsing Checks

 Forum and 50 Other Black List checks. 

web vulnerability scanner Blackhat SEO Scanning

web vulnerability scanner Fast Live Chat

vulnerability assessment penetration testing VAPT - Vulnerability Assessment & Penetration Testing

 Launch DoS and DDoS Attacks

Prevent Hackers from entering your network and stealing sensitive information! 

SecPoint Penetrator Vulnerability Management

The SecPoint Penetrator is a vulnerability scanning device that simulates how a hacker could penetrate a given system (hence the term) and reports vulnerabilities, which should then help strengthen security measures against online outlaws, virtual villains, cyber criminals, techno terrorists, and other nefarious elements of the Worldwide Web at large.

The SecPoint Penetrator is a vulnerability scanner, vulnerability management of great significance because it's actually capable of simulating cyber attacks against systems so that they are better prepared for anything a hacker might have under his sleeve, so to speak. In essence, the Penetrator will scan your device, network, or database to ensure that it is vulnerability-free.

To be more specific, vulnerabilities are the holes and coding flaws that hackers exploit so that they could wreak havoc on any supposedly secure website or domain. Their malware programs will likelier gain access to a given network if they could identify vulnerabilities that the network owner neglected to find. Therefore, the Penetrator is an essential reporting device that records in XML, HTML, and PDF all those minor-to-critical vulnerabilities before these online outlaws do.

The Penetrator can scan most everything from public to local IP addresses. It's the penetrative scanner you require in order to guarantee that your security is "airtight" and "hacker-proof". Most importantly, the SecPoint Penetrator is a device that evolves alongside security technology, so you'll never end up with an obsolete appliance that requires replacement post-haste. The reason for that is because the Penetrator regularly connects to the Internet in order to get the latest security updates around.

If there are white hat hackers who've recently uncovered some sort of vulnerability for whatever program or safety protocol around, you can rest assured that the Penetrator will be right on the case. Vendors will more likely have vulnerabilities patched immediately as long as their customers are aware of the danger and clamoring for action. 

The Penetrator helps make you more aware of the program holes and crevices that hackers and their malware can go through in order to destroy everything you've worked for. What's more, every time a new vulnerability is discovered, SecPoint databases are updated. The security company works round-the-clock in order to ensure that their products are always on top of the situation. You can even set your own Penetrator device like an alarm clock so that it will provide you notifications and schedule updates every time code flaws and possible glitches are found. 

If you want to make sure that your network is secure instead of enjoying a false sense of security that will lull you into complacency until it's too late and you've already been hacked, then it's imperative that you go through penetration testing via the vulnerability assessment capabilities of the securely designed, user-friendly Penetrator.

Penetrator is a security Appliance unit you simple place on your network.

VAPT - Vulnerability Assessment & Penetration Testing

Penetrator Video how to start an Audit?

 

 

more videos >>

 

 Frequently Asked Questions

 

What hardware is used for Penetrator Appliance?

Penetrator Appliance

The larger Penetrators are for maximum large scale vulnerability scanning.

What are the main features on Penetrator?

Vulnerability Scanning, 55.000+ Signatures.

Launch Dos Denial of Service

Brute Forcing, launch real Exploits

Can I have multiple users on a Penetrator Appliance?

Yes you can create multiple accounts that has access to different IP addresses.

What operating system does Penetrator run?

Penetrator runs on a customized Slackware Linux 2.6.

You manage it with a web browser over the network.

You can use any browser such as Chrome, Firefox, IE, Safari, Opera and many others.

Where can I see Penetrator customer references & testimonials? 

Please visit the SecPoint customer references and testimonials 

Which Operating system can I scan with a Penetrator?

You can scan anything with an IP address.

You can scan both local and public IP addresses.

The operating systems includes Windows, MacOS, Linux,BSD, Unix, Aix, and many others.

You can also scan routers, voip, firewalls and any network device.

How do I install Penetrator on the network?

Penetrator has an IP address.

So you just need to login to the web interface and configure the IP address.

You can set it on the Internal or External network as you like.

You can download the quick install guide here

How do I buy a Penetrator? 

We sell via our distribution channel of Distributors and Resellers all over the world.

 

Penetrator Vulnerability scanning appliance. Features Vulnerability     

Assessment, Vulnerability Management, Launch real exploits. Clear solutions 

to found problems.   

With Penetrator Appliance you can scan your IP addresses both Local and External for Web, and Full Host vulnerabilities.

It comes fully loaded with Vulnerability Scanning Capabilities.

Penetrator offers the best technology to doing vulnerability scanner.

It will scan Routers, Firewalls, Windows, Linux, MacOS,IP Telephones any system with an IP address for vulnerabilities.

Once it has scanned an IP Address it will give you a PDF report that comes with an Executive Summary that will brief explain if the IP address is vulnerable or not.

It shows the vulnerabilities by High Risk, Medium Risk, Low Risk. Where a High Risk vulnerability allows an attacker to fully penetrate the system, a Medium Risk will allow the attacker to get half way and typically by spending more time can gain full system access and a Low Risk Vulnerability can be different types of Information Disclosure that can allow an attacker to prepare for bigger attacks.

The Report will have a recommended solution for each found vulnerability so you can easily fix the found vulnerabilities.

Further more in the second part of the PDF is the Full Technical output. Here it will show how it did the attacks and output from the attacks so you can reproduce it.

Another Benefit is that you can setup the Schedule Scanning so it will scan your IP addresses automatically for example every week or every month for vulnerabilities. Via the Statistics module you can then compare from Week to Week or Month to Month and see how your security level is going up or down.

 

Penetration Testing - Pentesting

Vulnerability Scanner

Vulnerability Assessment

  Launch DoS and DDoS Attacks

Penetrator -Identify and resolve network weaknesses before the attackers do!
 

Key Features

Vulnerability Scanning Vulnerability Assessment

Penetration Testing

Application Security

Denial of Service DoS Tests

Buffer Overflow Attacks

Brute Force attacks

 

The IP License means that with a 16 IP model you can maximum Scan 16 IP Addresses on the same time. However if you start 16 Scans and in 2 hour all of them are finished then you are allowed to change the IP addresses and do 16 other scans. So the only limitation is how many concurrent scans you can run at the same time.

With the 256 IP Penetrator Appliance you can scan 256 IP addresses at the same time via the vulnerability scanning.

Vulnerability Management - Vulnerability Scanning

Penetrator is a vulnerability management and penetration testing appliance developed for network use. It comes pre-loaded and ready to go with all sorts of invaluable pen-testing features no administrator can do with it. Indeed, it is a powerful and intelligent security assessment solution.

• Includes both the SecPoint vulnerability scanner and penetration tester

• Vulnerability Scanning Capabilities

• It's a Plug and Play appliance

• No software installation is required; the SecPoint Penetrator and Portable Penetrator are ready to run on any machine

• Runs in web-based remote mode

• Scans anything with an IP address that's running TCP/IP protocols

• Discovery Mode automatically detects active IP addresses on your network

• 10/100/1000 Ethernet connectivity

• Hardened Linux OS

• The SecPoint Penetrator and SecPoint Portable Penetrator are certified CVE-compatible by MITRE and CVSS.

• Automatic SecPoint Updates 4 times a day

• Detailed fix information, which includes links to patches and software upgrades

• Dynamic reporting capability with Executive Summary and a Technical Details Service that shows all the particulars of a given vulnerability

• Flexible/customizable scanning options, which includes SANS/FBI Top 20

Comprehensive and Unlimited Vulnerability Auditing

With its all-inclusive vulnerability database and the application of sophisticated auditing techniques, Penetrator enables you to always be one step ahead of even the most skilled and advanced hackers. It has no limit on the amount of auditing you can do or on the number of IP addresses you can scan. Therefore, it is most certainly one of the strongest and most comprehensive vulnerability assessment solutions on the market today.

Interface Screenshots

vulnerability scanningvulnerability scanningvulnerability scanning
 

vulnerability scanningvulnerability scanningvulnerability scanner


Easy-to-Understand Reporting

Many reports can be customized and made available as XML, PDF, or HTML files. System vulnerabilities are categorized as either high risk, medium risk or low risk, together with name and details of each security hole and its respective fix or patch. The report also provides a complete analysis on the overall security level of the audited system. An executive summary is compiled specifically for management level review, which features both text and graphical details from the audit results.



Finds Cross Site Scripting, SQL Injection, and Website Errors

Penetrator is capable of finding Cross Site Scripting, SQL Injection, and Website Errors on any page found in the worldwide web via its automatic crawl engine.

vulnerability scanner

This standalone vulnerability assessment and vulnerability scanning auditor has an unlimited range of auditing power; that is, it can audit from just one IP address to an endless amount of IP addresses. This is made possible by its distributed system of auditing, which allows users to customize their appliances' auditor capabilities to their exact requirements and specifications.

All products from the vulnerability assessment auditor series are updated on a daily basis via a secure linkup to the SecPoint website. This ensures users the strongest possible IT security protection by giving them the newest records and lists of code flaws and vulnerabilities whenever they audit their network.

This application combines the strength of a vast and comprehensive database of vulnerabilities from the SecPoint website and the flexibility of traditional software scanners and auditors. Furthermore, it is compatible with nearly all available operating systems, which include:


Windows 98Windows XPWindows 2000Windows VistaWindows Server 2003LinuxUnixAIXSolarisOS/2Sun OSBSD Unix,NetBSD, OpenBSDFreeBSDFedoraGentooSlackwareUbuntuMandrivaMac OSMac OS Xand many more...

 

It also has the ability to audit hardware devices with TCP/IP addresses. Both local and external IP addresses can be audited wherever you are.
   

 

SecPoint Trustpilot Score

Related pages
Benefits of Vulnerability Management
Information about Vulnerability Assessment
Latest Penetrator Firmware Change Log
Network security vulnerabilities
On Demand Vulnerability Management
Penetrator Awards and Reviews
Penetrator Comparison
Penetrator Learning Videos
Penetrator Models
Penetrator Presentation Videos
Penetrator Questions FAQ
Penetrator S1400 Vulnerability Scanner
Penetrator S1800 Vulnerability Scanner
Penetrator S2200 Vulnerability Scanner
Penetrator S800 SFF 16 IP Vulnerability Scanning Appliance
Penetrator S800 SFF 32 IP Vulnerability Scanning Appliance
Penetrator S800 SFF 64 IP Vulnerability Scanning Appliance
Penetrator S800 SFF 8 IP Vulnerability Scanning Appliance
Penetrator S800 Vulnerability Scanner
Penetrator Tech Videos
Penetrator Vulnerability Scanner Sitemap
SecPoint Penetrator Vulnerability Scanner Visio Stencils
Vulnerability Management Benefits
Vulnerability Scanner Competitive Trade In
Vulnerability Scanner Information
Vulnerability Scanning ROI Calculator
What is the cost of a vulnerability scanner penetrator
What is the pricing of a vulnerability scanner
Want to be Contacted?
Click here to Get Contacted

Free Services
Free Wi-Fi Top 15 Security Tips

Free Penetrator Webinar

Free Vulnerability Scan

Free Port Scan
SecPoint News

SecPoint at Simet RestCamp 2014 Partner Event
Partner Days in Turkey 2014 Presenting Penetrator Vulnerability SCanner...
Wednesday April 23, 2014

Compatible With
Awards & Reviews
  
Customer References
Featured SecPoint Customers

Featured SecPoint clients



SecPoint® © Copyright 1999-2014
US Toll Free: +1-855-489-3724 - EU Toll Free: +44-808-101-2272