Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

SecPoint Products / Penetrator /

Penetrator Vulnerability Scanner Models Comparison

Find out the right Penetrator Vulnerability Scanning Appliance that suits your needs.

Learn which model you need for how many IP addresses you need to scan.

Vulnerability Management - Vulnerability Scanning

To select the best model for your please contact us.

Different Appliance Versions to perform

Penetrator Model Matrix

For more detailed differences please see our full Penetrator Matrix here.

Utm firewall Appliance 

Features

Penetrator S7 8-16 IP

vulnerability scanning

Penetrator S7 32-64 IP

vulnerability scanning

Penetrator S7 128-512 IP

vulnerability scanning

Penetrator S7 Unlimited

vulnerability scanning 

Dimensions

1U Rack Mount Heady-duty Steel

1U: 426 mm 365 mm x 44 mm

Carton Dimension: 560mm x 570mm x 190mm

1U Rack Mount Heady-duty Steel

1U: 426 mm x 365 mm x 44 mm

Carton Dimension: 560mm x 570mm x 190mm

1U Rack Mount Heady-duty Steel

1U: 426 mm x 365 mm x 44 mm

Carton Dimension: 560mm x 570mm x 190mm

1U Rack mount Heavy-duty steel

1U: 88 mm x 430 mm x 579.8 mm

Carton Dimension: 640mm x 800mm x 310mm

Weight 

6.5kg

In packing: 10kg

6.5kg

In packing: 10kg 

6.5kg

In packing: 10kg

19kg

In packing: 25kg

Distributed Scanning Yes  Yes Yes Yes

Max IP Scanning 

1-32 IPs 

1-128 IPs

1-256 IPs 1-1024 IPs
Launch DoS and Profile scanning Yes

Yes

Yes Yes

Power Required

200W ATX

AC/DC90~264V full range 

200W ATX Power Supply

AC/DC90~264V full range

200W ATX Power Supply

AC/DC90~264V full range

460W 1+1 ATX

AC / DC 90~264V full range 

Network Mbps 10/100/1000 Ethernet interfaces 10/100/1000 Ethernet interface 10/100/1000 Ethernet interfaces 10/100/1000 Ethernet interfaces
Failover Support No No Yes Yes
Dual Processor No No Yes Yes
Certifications

CE approval ŒŒ

FCC Class A

ŒŒUL

CE approval ŒŒ

FCC Class A

ŒŒUL

CE approval ŒŒ

FCC Class A

ŒŒUL

CE approval ŒŒ

FCC Class A

ŒŒUL

Redundant Disk

No No Yes Yes

➤ Related pages
About Vulnerability Assessment
Cloud Vulnerability Node Scan Distribution
How to connect Penetrator Vulnerability Scanning Appliance
Information Vulnerability Scanner
Latest Penetrator Change Log
Network Security Scanner
Network security vulnerabilities
On Demand Vulnerability Management
Penetrator Awards and Reviews
Penetrator Comparison
Penetrator Models
Penetrator Questions FAQ
Penetrator Quick Setup Guide
Penetrator S7 Appliance
Penetrator Scanner Sitemap
Penetrator Scanner Visio Stencils
Pricing of a Vulnerability Scanner?
The Best #1 Security Scanner
Vulnerability Management Benefits
Vulnerability Scan Wordpress
Vulnerability Scanning Methodology
Vulnerability Scanning ROI

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef