Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

You are here: SecPoint & IT Security News

Discover how you can deploy a Vulnerability Scanning Hyper-V

Hyper-V Software Image in your Virtual Environment 

Upgrade your Microsoft Hyper-V Virtual environment with the Penetrator Vulnerability Scanning Software Image.

Discover vulnerabilities across your network and setup automatic scanning.

Login to VIP Lounge to download the software Image

The SecPoint Penetrator can easily be deployed in a Microsoft Hyper-V environment.

The Penetrator Hyper-V software virtual Image allows you to scan your local and public IP addresses for Vulnerabilities.

If you need a trial or help to install the Image please contact our support team.

Tune Hyper-V for high Performance

When you have a virtual environment setup you can easily get high performance for scanning.

You can add more ram such as 8 Gig, 16 Gig or even 32 Gig to remove any bottlenecks.

Apply SSD disk drives for fastest performance storage and sorting through files.

And increase the amount of CPU cores. It is recommended to use 8, 16 or 32 Cores for maximum performance vulnerability scanning of large networks.

It is allowed to scan ANY type of IP address including Firewalls, Routers, Windows Operating system, Linux, Mac OS X, VoIP systems.

All that can be reached from the Penetrator software installation can be audited.

The scanning audit allows to chose up to 9 different profiles for the users requirement in vulnerability assessment scanning to be filled.

Vulnerability Scanner - Vulnerability Management 

Best State of the art Vulnerability Scanner, UTM Firewall, Cloud Security & WiFi Penetration Testing software

SecPoint® is focused to deliver the best most innovative Cyber security solutions and products.

Compatible with Product