Professional Documents
Culture Documents
No Software Required
l
11 Scan Profiles
l
www.secpoint.com
customer
websites
customer
websites
customer customer
websites websites
customer
websites
customer
websites
Vulnerability management
is key to any security strategy
Vulnerability Comprehensive and
Management Unlimited Vulnerability
The Cloud Penetrator™ is a cloud vulnerability Scanning
management and penetration testing tool to scan With its comprehensive vulnerability database
your online network or your Cloud. and the application of sophisticated auditing
Login from anywhere and it is ready to go. It is a techniques, , the Cloud Penetrator enables you to
powerful and intelligent online security always be one step ahead of even the most skilled
assessment solution. and advanced attackers. It has no limit on the
amount of auditing nor limit on the number of IP
addresses and is most certainly one of the stron-
gest and most comprehensive online vulnerability
assessment solutions on the market.
SecPoint® Cloud Penetrator™
Web Vulnerabilities Scanning
Easy-to-understand Reporting Scalable and Upgradeable Ready to go
ReportscanbecustomizedandcanbedownloadedasXML, Flexiblelicensingwithfullscalabilitytoadaptscopetocur- Youcanloginfromanyplaceontheworldtosetupandmoni-
PDF or HTML files. rentdemandsWehavemultiplebundlesavailablestarting tor your vulnerabilities audits .
from1IPaddress,constantlyevolvingtomeetdemands.
Systemvulnerabilitiesarecategorisedaseitherhighrisk, Professional Skilled Support
mediumriskorlowrisk,togetherwithnameanddetailsof Launch Real Exploits and De- Secondtononewiththefastestreplyandresponserateto
each vulnerability and its solution. nial of Service Attacks Security of all support queries in the industry.
Thereportalsogivesaconclusionastotheoverall informationisprotectedtoensureitsconfidentiality,integ- Thebest24Hourskilledsupportteamoperation.
security level of the audited online system. rity,andavailabilityMarketleadingvulnerabilitycoverage FastremoteloginwithproblemsolvingviaTeamViewer.
Anexecutivesummaryiscompiledspecificallyfor HighlyaccuratedetectionofCrossSiteScriptingandSQL FollowSupportTicketStatusviatheSupportCenter.
management level review with both text and Injection vulnerabilities in web applications.
graphical details from the audit results
Key Benefits
• Improve accuracy
Extensive vulnerability database updated
on a daily basis and few false positives
www.secpoint.com
SecPoint® Cloud Penetrator™
Web Vulnerability Scanning
Cloud Penetrator
Cloud Penetrator™ Benefits >>
www.SecPoint.com
Centralised Reporting
Vulnerability 55.000+ Intelligent FindsSQLInjection Multi User Distributed XML PDF Multiple Daily
Audit Signatures Audit CrossSiteScripting Support Audit HTML Updates
Automatic Crawl Launchrealexploits Scans any OS WebServerErrors Reports
script
Work Stations
Wireless Access
Points
Servers
u
www.secpoint.com
For more information on Cloud Penetrator, please visit
https://www.SecPoint.com/cloud-penetrator.html
https://support.SecPoint.com