Web Scan

SecPoint has a Web Scan service available that enables you to scan your website specifically for vulnerabilities against common hacker exploits and whatnot.

The SecPoint Web Scanner has the ability to search, identify, and address command execution, cross site scripting (XSS), and SQL injection exploits.

Common security holes in popular CMS systems like Drupal, Wordpress, and Joomla can also be weeded out thanks to the web-scanning capabilities of SecPoint.

After doing a web scan, you will receive in PDF, HTML, or XML form detailed reports of the scan itself assessing the security health of your scanned website in a comprehensive manner. It is recommended to do web scans daily or on a weekly basis on all your sites.

Security Scan your Web Site from your Browser

What's more, the SecPoint Cloud Penetrator is an in-the-cloud (that is, virtual) pen testing solution that enables you to do Penetrator tasks like VAPT (Vulnerability Assessment and Penetration Testing) at the comfort of your web browser.

Web scan can be accessed through the SecPoint website or through the VAPT capabilities of the cloud version of the Penetrator.

The act of web scanning itself involves active and well-updated analysis of your system for any and all possible vulnerabilities even without having to install any programs on your local hard drive.

You can do it all in the comfort of your browser, because the web scanning facility is a web app that you can execute virtually, thus allowing for daily updated scans you can depend on. 

Find errors in coding

In particular, it can sniff out operational weaknesses in technical or process countermeasures, both unknown and known software or hardware flaws, bugs, glitches, and improper system configuration.

Errors in coding can also be exploited to run host of malware like viruses, worms, Trojans, botnets, spyware, adware, and so forth.

The vulnerability scanning capabilities of the SecPoint Web Scan can also be relied upon when it comes to analyzing potential breaches in security from the point of view of the attacker itself, thus enabling easier pen testing.

In fact, it's recommended that a thorough scan of your website is done before any penetration tests are conducted.