A Rundown of SecPoint Products
At SecPoint, we offer technology that will scan your networks for security vulnerabilities and give you solutions for any existing network security loopholes. Here's a closer look at our products.
The SecPoint Security Penetrator is a plug-and-play vulnerability scanning device (or virtual software) that scans for loopholes and coding flaws that hackers can use to attack your network. This product checks both your internal local IP addresses and public IP addresses and generate comprehensive reports on any vulnerabilities.Simulated Attacks
As the name suggests, the SecPoint Penetrator "penetrates" your devices, networks or databases and simulates cyberattacks against them. If the simulated attack succeeds, it indicates that there are vulnerabilities present (which means malware programs can easily gain access to your network).
One of the main types of simulated attacks that SecPoint Penetrator launches is a Denial of Service (DoS) attack. This attack is designed to shut down a service or network — if it succeeds, you know that you need to improve your cybersecurity.Scans
A central feature of SecPoint Penetrator is its ability to rapidly launch Denial of Service (DoS) attacks, or attacks designed to shut down a service or network. It can also carry out advanced scans, such as:
Moreover, SecPoint Penetrator provides detailed reports to help you improve. The software will record all minor to critical weaknesses in the network and report them in an XML, HTML or PDF format. Information on how to eliminate the identified weaknesses is also included in the report.
The SecPoint Protector is an advanced UTM Firewall and Ransomware Blocking software capable of securing and protecting your network from remote and local cyberattacks. It also has an advanced Anti Spam feature that supports the complete scanning of both incoming and outgoing mail, ensuring your network is secure and spam-free at all times.Key Features
Some of the key features of the SecPoint Protector include:
What sets SecPoint Protector apart from other competing software is that it offers a unified package consisting of firewall, anti-virus and WiFi security solutions, all for the price of one. Moreover, all the three solutions work as a team — they don't interfere with one another's abilities.
SecPoint Cloud Penetrator
SecPoint Cloud Penetrator is a Software as a Service (SaaS) Cloud Vulnerability Scanner that scans your websites and e-commerce sites for vulnerabilities (regardless of the operating system or network device you're using). The software can scan sites like WordPress, Shopify, Drupal, Joomla, Webshops and Umbraco.Key Features
Some of the key features of the SecPoint Cloud Penetrator Include:
SecPoint Cloud Penetrator has a comprehensive vulnerability database and can scan sites for up to 60,000 different vulnerabilities. You'll always get a comprehensive solution that you can use before attackers have the chance to exploit your network.
SecPoint Portable Penetrator
SecPoint Portable Penetrator is a WiFi penetration testing scanning software that helps you determine the vulnerabilities in your wireless network and secure it before hackers get a chance to attack. By inspecting your internal and external IP ranges, the software can expose any security issues early on.Wireless Protection
SecPoint Portable Penetrator software can test the strength of your WiFi network. If it compromises your network, you'll get a comprehensive report containing your current WiFi password and how it succeeded in getting the password. The information will also include the steps you need to take to secure your wireless network from similar attacks.Detecting Breaches
Another key feature of the SecPoint Portable Penetrator is the ability to detect breaches. It can determine if your wireless network is still secure, or if black hat hackers have already breached it. The software also offers over seven techniques you can use to recover your WEP, WPA, WPA2 or WPS WiFi password. This means you never have to worry about going without an internet connection, even after someone has hacked your WiFi network.Reports
Once the SecPoint Portable Penetrator software completes a vulnerability scan on your wireless network, it generates a professional and easily customizable PDF/HTML/XML report containing all weaknesses identified in the system. The reports usually come in two types:
We want to make sure that everyone — not just the technologically savvy — is aware of your cybersecurity needs and the steps you need to take to protect your company.