Best State of Art Cyber Security Solutions
The best Innovative and powerful IT Security products

SecPoint® Next Generation Cyber Security

  • Product

    WiFi Penetration Testing

    • Recover WiFi Password

    • WiFi Penetration Testing

    • WPA2 - WPA - WPS WiFi Keys

    • Secure your WiFi Networks

    More Info

    Web Store
  • Product

    Vulnerability Scanner

    • Vulnerability Assessment

    • Vulnerability Management

    • Software & Appliance

    • 5 Star Awarded

    More Info

    Web Store
  • Product

    Next Generation Firewall

    • UTM Firewall SSLVPN

    • Web Filtering - IPS

    • 3x Anti Virus Engines

    • Bandwidth Management

    More Info

    Web Store
  • Product

    Cloud Vuln Scanner

    • Web Vulnerability Scan

    • SQL Injection - XSS

    • Advanced Crawlers

    • Software as a Service (SaaS)

    More Info

    Web Store

 


Best most Innovative & Powerful IT Security products

We value privacy highly by having backdoor free products and no data being collected.

Full High Powered 64 Bit Performance platforms supported.

No software installation required. Easily setup scanning schedule and get notified when new vulnerabilities are discovered on your IPs.

If you are not sure which IT security product you need for the maximum security protection feel free to sign up for a free webinar to get a good understanding.

We work closely with the sales channel for optimal customer feedback and to deliver new software updates to serve the customers requirements. We deliver the best IT Security products for Vulnerability Scanning & Vulnerability Assessment



SecPoint® Protector™ - High Performance UTM VPN Firewall

The Protector Best UTM SSL-VPN Firewall offers powerful incoming & outgoing Network protection.

  • 64 Bit - High Performance architecture Virtual & Hardware appliances with SSD.
  • IPS - Secure your network and protect from incoming attacks with the powerful 64 bit Intrusion Prevention System (IPS) engine.
  • Firewall - Protect your entire network. Fully loaded with Mail logging on hard drive - easily store all incoming and outgoing mails
  • VPN - SSL VPN - IPsec Lan to Lan - Client to Lan
  • Anti Virus -  Multiple engines supported for best protection: Eset - Kaspersky - ClamAV
  • Anti Spam - Strongest updated engine with advanced settings, latest RBL for highest spam catch rate.
  • Mail Archive - with individual user login. Log all mails incoming & outgoing on the harddrive.
  • Web Filter - Block Social Media - Dangerous Sites - Time Based control - User & Group Control - Increase productivity.
  • Content Filter - Block Bittorrent, TOR, Proxies, Network games & other unwanted traffic.
  • Microsoft Active Directory & Ldap Integration.
  • Vulnerability Scanning - Discover Vulnerable systems across the Network.
  • High Availability for Maximum Security.

Read more

 

SecPoint® Penetrator™ - Vulnerability Assessment and Management Solution

The Penetrator Vulnerability Scanner software & Appliance allows for powerful network auditing.

  • 64 Bit - Virtual ESXi, Hyper-V, VMware or Hardware Appliances.
  • Vulnerability Scanning & Vulnerability Assessment.
  • All data stored at customer site.
  • Multi User support.
  • PDF XML HTML reporting.
  • Report in multiple formats: Technical, Consultant, Executive.
  • Allows for Report and Interface re branding.
  • 9 Default Scanning Profiles - Customize your own profile.
  • DoS, DDoS, Exploits.
  • Distributed Scanning - Central Management of multiple Penetrator installations.
  • Scan local and public IPs.
  • No cost per scan only limited to concurrent scans.
    You can scan both local and public IP addresses with up to 9 different scanning profiles. The SecPoint IT Security products features: No backdoors - No information gathering.

Read more

 

SecPoint® Portable Penetrator™ - WiFi Penetration Testing Password Recovery

Recover WiFi WEP WPA WPA2 WPS Keys. Professional WiFi Penetration Testing software.

WiFi Penetration Testing Software - Recover WPA WPA2 WPS WEP Keys, Denial of Service DoS.

Portable Penetrator Ultimate WiFi Penetration Software. Carry out real WiFi attacks on your WiFi access points to discover vulnerabilities. Man in the Middle attacks, Connection handshake capture, Brute force and Denial of Service attacks.

  • WEP - WPS - WPA - WPA2 Password Recovery.
  • 32 Bit and 64 Bit supported.
  • Connection Handshake capture for online or offline key cracking.
  • 1.1 Billion entries word lists included.
  • WiFi DoS Penetration Testing.
  • 2.4 GHz - 5.8 GHz WiFi supported.
  • Easily connect with WiFi USB Adapters.
  • Run on your laptop for maximum mobility - Windows 10 / Mac OS X.
  • Deploy latest 7 techniques for WiFi Password recovery
  • Import / Export WPA WPA2 handshakes for password recovery.
  • More than 30 language specific word lists included.
  • Import your own Word List.
  • Discover hidden rogue WiFi Access Points
  • Customized PDF reports available with result.
  • Supported WiFi adapters from Alfa, TP-Link, Panda and more.

Read more

 

SecPoint® Cloud Penetrator™ - Web Vulnerability Scanner

Scan your public IP addresses for vulnerabilities with the Cloud Penetrator Best Web Security scanner.

Web Security Scanner - Find SQL Injection XSS, CSRF & popular vulnerabilities

  • Software as a Service (SaaS)
  • Minimal Server impact during scan.
  • Choose between 9 scan profiles.
  • Scan Popular CMS: Wordpress, Joomla, Drupal & others.
  • SQL Injection Crawler.
  • Cross Site Scripting XSS
  • Command Execution Vulnerabilities.
  • Information Leak Disclosure.
  • Automatic Scheduled Scans.
  • Automatic crawler find unknown vulnerabilities.
  • Customize scan to scan multiple Virtual Hosts.
  • Detailed statistics with time comparison.
  • Easily Download all your reports.
  • Multiple report formats Technical, Consultant or Executive.
  • Scan Firewalls, Mail Servers, Web Servers IoT, Windows, Linux, Mac OS X.
  • User friendly Interface easy to use.
Read more

 

SecPoint® Protector™ - UTM Firewall

SecPoint® Penetrator™ - Vuln Scanner

SecPoint® Portable Penetrator™ - WiFi Pen Test

SecPoint® Cloud Penetrator™ - Cloud Scanning

 

Best Cyber Security Vulnerability Scanner - UTM Firewall & WiFi Pentesting
SecPoint® is focused to deliver the best most innovative Cyber Security Products

Compatible with Product