|» Secpoint NEWS|
|» 29 September 2011|
|SecPoint Cloud Penetrator Press Release|
SecPoint announces the Cloud Penetrator, full web server protection against hackers
IT service providers that used to be used by large firms are catering more and more to a mass of smaller companies keen to migrate towards cloud-based services and take advantage of cost savings, increased service and enhanced security.
But in doing so, these smaller companies are handing over key data to outside providers who are often targets for hackers looking to take whatever they can from multiple clients hosted on the same server. Hackers love multiple targets in one setting, which the cloud provides, so a cloud host could actually make data more vulnerable!
After viruses were found on servers belonging to Japanese weapons contractor, Mitsubishi Heavy Industries, in a cyber attack this week and the Sony customer credit card data theft earlier this year, both involving cloud-based systems, many companies now have serious concerns about data security and business continuity when outsourcing their websites, databases and e-commerce sections to cloud providers.
When tech-research group IDC asked businesses in 2008 what factors were most likely to discourage their use of cloud computing, 72% of small businesses and 63% of midsize companies said security was their chief worry. But by mid-2011, those numbers had dropped to 50% and 47%, respectively.
So, ask yourself - are you part of the problem or part of the solution? Many cloud-based IT services are stepping up security markedly, by finding the weaknesses in their systems and closing them before hackers can enter.
The <a href="http://www.secpoint.com/cloud-penetrator-web-vulnerability-scanner.html">SecPoint Cloud Penetrator's</a> key components identify all of these entry points hackers look for...
It scans daily; has more than 50,000 signatures that get updated regularly; includes a black-hat SEO scanner to show whether you have anything on your hosted websites that can get you delisted by search engines; it can scan websites, web shops and database servers - even if they're firewalled - as well as routers and anything else that has a public-facing IP address. It can also scan Content Management Systems, including Wordpress; as well as for SQL Injection, XSS & other web vulnerabilities.
The Cloud Penetrator provides detailed PDF Reports with clear solutions on how to fix all found vulnerabilities, with a user-friendly interface and support, including live chat.
The cost for 1 IP address for 1 year Cloud Penetrator scanning is €99 or US$129. Journalists may apply for a free test Cloud Penetrator by writing to the contact below.
Images of the Cloud Penetrator are available for download, here:
Notes to editors:
Europe's leading IT-security company SecPoint delivers specialized UTM, vulnerability management solutions with Grey Listing, Web Filter and Content Filter.
Services include Intrusion Prevention, IT Security Penetration Testing and Wi-Fi Security auditing to businesses worldwide.
Operating globally since 1999 and headquartered in Copenhagen, Denmark, SecPoint has been delivering high-end security products to more than 1200 customers across SecPoint Operations in the United States and Europe.
For further information, please contact:
Tel: +45-40 90 16 30
For the latest news follow SecPoint on:
|Want to be Contacted?|
|Click here to Get Contacted|
» Weekly IT Security News 15 September 2014
» How to run Wifi Password Recovery Software on your Sub notebook?
Free Wi-Fi Top 15 Security Tips
Free Penetrator Webinar
Free Vulnerability Scan
Free Port Scan
|Awards & Reviews|