SecPoint - Best IT Security
Innovative and powerful
IT Security products
Get the Latest SecPoint IT Security News
SecPoint Videos Channel here
Get updated on latest SecPoint Security News.
SecPoint Blog here
Get updated on latest SecPoint Security News on our Blog.
You can click below to choose the SecPoint Security News or the more General IT Security News.
If you are interested in a testing a Protector UTM VPN Firewall or Penetrator Vulnerability Scanner please contact us.
» IT Security News
Protector UTM Firewall 38.5 released
New Protector 38.5 Ultimate Firewall UTM Appliance...
New Help Desk system with Overview of Tickets
SecPoint has increased the support efficiency by launching a new Ticket Help Desk System....
Happy Holidays Successful New Year 2017 Free Gift!
Happy Holidays and a successful New Year - Get your free gift...
What a SQL Injection Is (and How to Fix It)
Are you aware of what a SQL Injection can do to your site? If you aren't, read this. We're sharing what it is, and how you can fix it when it happens....
Upgrade to new Penetrator 34.6
The New Penetrator 34.6 comes fully loaded with new set of features, improvements and benefits....
New SecPoint Penetrator 64 Bit edition Released
High Capacity 64 Bit Penetrator Vulnerability Assessment released...
32 Bit VS 64 Bit Operating system which is better
How to tell the difference between a 64 bit and 32 bit operating system. Which one has the performance benefits?...
Software To Easily Hack WiFi - Windows 10 Click here
Tо bе ѕurе оf thе level оf thе encryption оn уоur WiFi network, уоu nееd оur Software tо easily ha...
New Penetrator & Protector ESXi Virtual Images
Download new Penetrator Vulnerability Scanner & Protector UTM Firewall Virtual ESXi Images...
Download New Penetrator 30% faster WPA Cracking
New Generation of Portable Penetrator released read to find out more....
Have you seen the new SecPoint Web Store? - Click
Click to see the new updated SecPoint Web Store...
One third websites vulnerable to HTTPS DROWN Vuln
Yet another OpenSSL Vulnerability discovered. Find out if your site is affected open and vulnerable to remote compromise attack?...
Improve UTM Firewall Experience with Nightly Updates
Extend the userability of your Firewall UTM Appliance with Nightly Updates and Firewall Wizard Watch tutorial videos...
Upgrade to the latest Protector UTM 32.5 Firewall
New Protector UTM Firewall 32.5 brings new features and functionality. Including ...
US Arrest Records Database Compromised by Hackers
Remote attackers have gained access to the US Arrest Records Database system and released ...
Complete guide to Bitcoin and security risks involve
Find out the complete guide to setting up BitCoin and be aware about the Security risks and how you can protect your self....
New Penetrator V30 released & New Virtual VM Image
Penetrator Software and Portable Penetrator version 30 released. Virtual images are available for download....
Office Personnel Management 5.6 Mill fingerprints
American Office of Personnel Management: Hackers have stolen 5.6 Million peoples fingerprint...
Apple App Store once again infected with Malware
Apple is known to deploy strong security scrutiny for new apps to the apple app store but Hackers once again found a way around...
200,000+ still vulnerable to Hearbleed 17 months on
200,000 targets still vulnerable to Heartbleed vulnerability after discovery and patch has been issued...
New Penetrator 28.6 Version released
The best Penetrator ever has been released new version 28.6 Watch the Video for Full change log...
Vulnerability Scanner Spanish Croatian Thai Dutch
New Penetrator Vulnerability scanner offers multiple language support for the reporting...
How to Prevent Windows 10 from Spying Full Guide
17 steps to follow. Easily make Windows 10 stop spying on you. Easy to follow step by steps to secure your Windows 10 and prevent sensitive information leaking....
Penetrator V28.0 Vulnerability Scanner Released!
Penetrator V28.0 Vulnerability Scanner Release Video, Release notes and full change log click for more info....
Come Visit SecPoint at 11 May 2015 ICTvakdag
Visit SecPoint at the Dutch Exhibition ICTvakdag...
Millions of Wordpress Sites Vulnerable - Scan Site
Get a FREE Scan to find out if your Wordpress site and see if you are vulnerable to the latest XSS Vulnerability...
Exposing WiFi Networks in Copenhagen Denmark
Discover WiFi NON and Encrypted WiFi Access Points in a Major European City...
New WiFi Penetrator V26.8 released
Upgrade to the new powerful Penetrator Security Scanner with Vulnerability Scanning and WiFi Pen testing capability...
New Firewall Protector 32 Release High Availability
Easily upgrade your Virtual or Hardware appliance to new version 32.0 of Protector UTM Firewall. The new version gives you improvements to the firewall module and a fully automatic high availability ...
How to block an entire Country Firewall Free Webex
Are you under attack from different IP ranges easily block the entire countries...
Can you do WiFi Password Recovery on Windows 10
Is Windows 10 better than Windows 8.1 or Windows 7 for WiFi password recovery and vulnerability scanning...
New Next UTM Firewall Protector 30.5 released
Upgrade to the new powerful Protector UTM Firewall Version 30.5 that includes the following points....
Ultimate WiFi USB Adapters Pen Testing Guide Testing
Which USB WiFi Adapter can discover most networks for WiFI Penetration Testing Password Recovery...
New Firewall 30.0 released UTM Firewall with SSLVPN
New SSLVPN Firewall VPN Release v30.0...
New Firewall Protector VPN 28.5 Released
Downloadable firmware ready for Firewall VPN IT Security Appliance 28.5 released...
Pictures from SecPoint at CDIC 2014
Bangkoksystem with SecPoint at CDIC Pictures from SecPoint at CDIC 2014 Thailand...
Firewall UTM IPS Intrusion Prevention
A firewall with Intrusion prevention capabilities...
Top 14 IT Security Trends - Important Security Tips
Discover more about the Top 14 IT Security Trends Click...
Pictures from SecPoint at ICTVakdag Beurs Holland
ICTVakdag 2014 Pictures ...
New SecPoint May Trustpilot Reviews
New Penetrator Trustpilot Reviews for May 2014...
SecPoint at Simet RestCamp 2014 Partner Event
Partner Days in Turkey 2014 Presenting Penetrator Vulnerability SCanner...
New update system in upcoming Penetrator V26
Amazing Penetrator Vulnerability Scanner to feature new Update system...
SME World Summit 2014 Nbiz Infosol SecPoint Penetrator
SecPoint Penetrator SHown at SME World Summit 2014...
Heartbleed Openssl Security Vulnerability bug
Are you vulnerable to the Heartbleed SSL security vulnerability?...
Difference between vulnerability scanning pentest
What is the difference between Vuln Scanning and real Pen testing?...
Next Gen Web Filtering Next Gen Firewall Appliance
Learn more about Next Gen Web Filtering...
New Penetrator Vulnerability Scanner 22.5 Ticket Sys
New 22.5 Penetrator Vulnerability Scanner featuring Ticket System - Global False positive management and more...
New SecPoint Visio Stencils for Security Products
Download the SecPoint Stencils...
NSA Prism Program - Snowden - Can you trust your Sec
NSA Prism Program can you still trust your Security Provider?...
WiFi Security explained Infographic
How black hat attackers compromise WiFi attackers...
WiFi Security Utopia Perfect WiFi Security Possible?
WiFi Security Utopia WPA WPA2 WPS encryption strength...
Importance of UTM Firewall Appliance in organizations
Importance of UTM Firewall Appliance in organizations ...
Necessity of vulnerability scanning
Necessity of vulnerability scanning...
Next Generation Anti Spam Firewall
Beset Advanced Anti Spam Firewall...
Do you know if your joomla site is secure
Do you have a secure Joomla site?...
How to scan multiple IP addresses on Penetrator
scan multiple ip on penetrator...
New WPS WiFi Password Recovery WPA WPA2
New WPS WiFi Password Recovery WPA WPA2...
Reaper Crack WPA2 psk WPS Vulnerability Key Finder
reaper crack wpa2 psk...
Hack WiFi Password in Windows XP Key Recovery
hack WiFi password in Windows XP ...
Penetration Testing - Pentesting Vulnerability Scanner
New Penetration Testing - Pentesting Vulnerability Scanner - Vulnerability Assessment...
Free Threaded Syn TCP Port Scanner 3.0 released
New Port Scanner 3.0...
Free Threaded TCP Syn Port Scanner 2.0 released
Free Threaded TCP Syn Port Scanner for Windows & Linux...
The Portable Penetrator on a Macbook Pro WiFi WPA
The Portable Penetrator on a Macbook Pro...
New Wireless Security Assessment Tool
New Wireless Security Assessment Tool...
New Penetrator 8.2 WiFi Bomb MAC Randomizer
New Portable Penetrator 8.2 WiFi Bomb - MAC Randomizer and more...
Press Release SecPoint Portable Penetrator gets top review
The Portable Penetrator Top Review Press Release ...
Network Security Portable Penetrator Review Feb2011
Network Security Portable Penetrator Review Feb 2011...
The Portable Penetrator on the road Florida Mustang
The Portable Penetrator on the road Florida Mustang Wardriving WiFi Penetration Testing...
Top Facebook Passwords NOT to use
Top Facebook Passwords NOT to use...
Security Manager Magazine Portable Penetrator Review
WiFi Portable Penetrator Review by Security Manager Magazine...
WEP Cracking WiFi HD - Software Easy to use - Video
WEP Cracking WiFi HD...
WiFi WPA2 Cracking - Password key Recovery Software
WiFi WPA2 Cracking best software...
Hakin9 IT Security Magazine English Review
HAKIN9 Hard Core IT Security Magazine Number 2 2010 44 March April 2010 New Portable Penetrator PP3000 Hakin9 Magazine Review. ...
SecPoint Partner Days 2010 Copenhagen Pictures
SecPoint Partner Days 2010 Copenhagen 9th 10th April Pictures...
SecPoint Security Manager Magazine Interview
SecPoint featured in Security Manager Magazine with an Interview...
SecPoint at Wireless and Mobile London
SecPoint featured at the Wireless and Mobile Exhibition in the UK...
Securely protected by SecPoint