State of the art Cyber Security Penetrator Vulnerability Scanner can help you to find the vulnerabilities on your entire network. You can scan your internal local IP addresses and your public IPs available on the Internet. Find your vulnerabilities automatically with the schedule scanning and get notified by email once new vulnerabilities are discovered. It comes with professional PDF & HTML reporting that will show you the evidence of vulnerabilities and information on how to eliminate them.
The Penetrator combines the latest hacking and cracking tools that offers the most comprehensive penetration testing kit.
Security Auditing of any Operating System or Network Device
The Penetrator is designed to audit any opera ting system or network device. It is beneficial to audit any device in the network setup to find and rectify any identified vulnerabilities before an attacker can exploit the vulnerabilities.
Vulnerability Assessment is key to any security strategy
The latest automated hacking tools can inflict damage aeross a netvvork and aeross the vvorld in a matter of hours. Understanding the potential vulnerabili¬ties vvithin your system is vital to any security strategy.
Vulnerability Assessment
The Penetrator is a Vulnerability Assessment and penetration testing appliance for your network, which comes preloaded and ready touse out of the box. It is a powerful, easy to use and intelligent security assessment solution.
Unique Distributed Penetrator Capabilities
You can connect multiple Penetrators in a distributed network. This gives many unique advantages such as:
- Centralized reporting
- Centralized vulnerability assessment
- Centralized update point
Possibility to audit different locations from a master Penetrator located in another city.
60.000 +Vulnerabilities
The Penetrator vulnerability database consists of more than 12 years of research.
The database has a total of more than 60.000
unique remote vulnerabilities to test for.
This database is updated multiple times daily.
S7 - Virtual Edition | |
Maximum Concurrent Scans | 1 – 1024+ IPs |
Maximum Cloud Users | No software limit |
Maximum IP Reporting in interface | 10.000+ IP Reports |
All Data stored locally | |
WiFi Pen Testing WPA WPA2 WPS | |
Helpdesk Ticket System | |
Customize Report Branding | |
Customize Interface Branding | |
Interfaces | - |
Local Storage | 500 Gb |
RAM / CPU | 8 Gb / I7 Quad |
Power Supply | Single PS |
Form Factor | Rack Mount 1RU |
Support & Firmware included | |
All data stored locally | |
Vulnerability Scanning | |
Full Linux no reboot required |
* Hardware values are given for information to show the ideal values that the firmware should be installed on a system.
Easy-to-understand Reporting
Reports can be customised and are available as XML, PDF or HTML fileş. System vulnerabilities are categorised as either high risk, medium risk or low risk, together with name and details of each vulnerability and its remediation. The report also gives a condusion as to the overall security level of the au- dited system.An executive summary is compiled specifically for management level revievv with both text and graphical details from the audit results.
Easy to install
The Penetrator is compatible with any operating system. İt is easy to install, with minimal configuration. Installation vvizards provide for fast set up.
Scalableand Upgradeable
The Penetrator is scalable for netvvork grovvth and IPaddresses.
Distributed Audit Capability
You can setup multiple Penetrator at different locations on the internal netvvork and remotely via an encrypted secure connec- tion connect them together. This allovvs distributed auditing, configuration and reporting from a centralized point.
Launch Real Exploits and Denial of Service Attacks
You can launch real exploits to verify that an
identified vulnerability is exploitable. İt is also
possible to launch real Denial of Service attacks to test preproduction systems for stability.
Bu ürüne ait özellikler veritabanımızda bulunmamamktadır.
Bu ürünle ilişkili bir ürün bulunmamaktadır.