SecPoint Penetrator Autonomous Sonar Robot
The new Vulnerability Scanner Autonomous Sonar Robot module is now available for the SecPoint Penetrator Vulnerability Scanner.
With the new Autonomous Sonar Robot it is possible to automatically sweep any local or public network. Easily set up new scanning profile template with the desired IP ranges to monitor.
Autonomous Vulnerability Scanning
Then it will be possible for the SecPoint Penetrator Vulnerability Scanner by intervals of 5, 10, 15, 20 mins to scan and detect new devices.
The limitation with traditional Vulnerability Scanning schedules are shown when they are limited to Daily, Weekly, Specific date or Quarterly scans.
If a new malicious or non malicious device that just leaks sensitive data is connected to a network it wont be detected. It could be an accounting person connecting a laptop to check do the company bookings not knowing the laptops has open shares leaking sensitive data.
Discover when unauthorized users connect their devices such as smartphone or laptops to your network.
It can be a malicious person walking in to the building disguised as a courier guy with a laptop.
He connect the laptop and it can have a Linux distribution running designed for hacking.
In this case the Penetrator will discover the device do a scan and sent to the user. When detecting a new unauthorized Linux device
on the network it can raise alerts to the administrator that can check video monitoring and find out when unauthorized person entered
Detect unauthorized devices spreading Ransomware or Malware
It can also be someone planting an unauthorized device such as an Raspberry Pi that is connected to the network.
Then it is sweeping the network for vulnerabilities or launching malware or ransomware attacks.
Again the Penetrator will automatically find the device and alert the administrator.
Autonomous Report Generation
Or it could be a Blackhat attacker connecting a laptop with scanning tools and exploits. No matter which kind of device is connected the Penetrator can automatically detect it and perform a full vulnerability scan VAPT with AI machine learning capabilities. After this the administrator of the Penetrator will automatically get notified and have full control of any vulnerable devices entering the network.
If the administrator detects a device leaking sensitive data or poses or risks or threats the administrator can take swift action fast.
By knowing more faster that a new unauthorized device is connecting potentially causing harm to the network or leaking sensitive data the administrator can block it off or secure it fast.
The SecPoint Penetrator uses advanced techniques to discover new devices even if they are trying to hide from discovery on the network.
It is recommended to enable the Autonomous Sonar Robot on any high priority network to fast detect unauthorized devices connecting.