Top Banner
The Penetrator key features and sales information
22

Sec point penetrator-presentation-2010

Jun 16, 2015

Download

Business

SecPoint ApS

Penetrator Vulnerability Scanner Power Point from 2010
http://www.secpoint.com/portable-penetrator.html
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Sec point penetrator-presentation-2010

The Penetrator key features and sales information

Page 2: Sec point penetrator-presentation-2010

Vulnerability Assessment & Penetration Testing AppliancePortable Penetration Testing & Wireless Auditing

The Penetrator & The Portable PenetratorThe Penetrator & The Portable Penetrator

Page 3: Sec point penetrator-presentation-2010

Complete Penetration Testing Complete Penetration Testing

Complete Security solutionComplete Security solution

VulnerabilityVulnerabilityAssessmentAssessment

Wireless AuditingWireless Auditing

PenetrationPenetrationTestingTesting

Page 4: Sec point penetrator-presentation-2010

Vulnerability AssessmentVulnerability Assessment

VulnerabilityVulnerabilityAssessmentAssessment

Security Auditing. 43.000+ Signatures. Automatic Crawl Engine to find

XSS, SQL Injection, Web errors. Unlimited Auditing. Audit any Operating System. No Software Installation. Multi User Account Support. Distributed Auditing. XML, PDF and HTML Reports. Award Winning.

Page 5: Sec point penetrator-presentation-2010

Targets off Vulnerability AssessmentTargets off Vulnerability Assessment

VulnerabilityVulnerabilityAssessmentAssessment

Direct Sales As a Service (SaaS).

Optimizing security for Web designers

Optimizing Security for Web shops

Security policy for Enterprise Users

Page 6: Sec point penetrator-presentation-2010

Penetration TestingPenetration Testing

Launch Real Exploits.

Launch Real Denial of Service.

Brute Force Password Files.

Crack Zip Files.

Protocol Ftp, Http... Bruteforce.

Penetration Penetration TestingTesting

Page 7: Sec point penetrator-presentation-2010

Extended Penetration TestingExtended Penetration Testing

Launch Multiple Real Denial of Service attacks with Distribution setup

Penetration Penetration TestingTesting

Page 8: Sec point penetrator-presentation-2010

Targets off Penetration TestingTargets off Penetration Testing

Show proof of the Assessment

Optimizing Security for Financial companies like Banks.

Security Check before a System goes online

New business for new customers

Services for Cracking Zip Files.

Penetration Penetration TestingTesting

Page 9: Sec point penetrator-presentation-2010

Wireless AuditingWireless Auditing

Find open wifi networks with up to 300% range antenna range.

Find Weak Passwords. Crack WEP, WPA, WPA2. Guide to secure your Wireless

setup.

Wireless AuditingWireless Auditing

Page 10: Sec point penetrator-presentation-2010

Targets off Wireless AuditingTargets off Wireless Auditing

Optimizing Security for Wifi networks

Security Second Option service Easier replace bad Wifi products

after audit.Wireless AuditingWireless Auditing

Page 11: Sec point penetrator-presentation-2010

The Penetrator - Unique Selling PointsThe Penetrator - Unique Selling PointsMulti User SupportSell Security Audits as a service (SAAS)Launch Real Exploits, Denial of ServiceUnlimited security auditsFind and crack Wireless Networks43.000+ SignaturesReports in PDF, HTML, XML and syslog formatBruteforce and crack protocols, zip filesFind SQL Injection, XSS, Web ErrorsDistributed AuditingAudit any Operating SystemNo Software Installation

Page 12: Sec point penetrator-presentation-2010

The Penetrator - Unique Selling PointsThe Penetrator - Unique Selling PointsEasy to useCan be used as Sensor with the Distributed setup

For Local Auditing of Servers and workstationsAll Data of the audit stays on the unit so no Vendor backdoor.

Page 13: Sec point penetrator-presentation-2010

Technical info

Page 14: Sec point penetrator-presentation-2010
Page 15: Sec point penetrator-presentation-2010

How to Sell Vulnerability How to Sell Vulnerability Assessment?Assessment?

Page 16: Sec point penetrator-presentation-2010

Where to Sell Vulnerability Assessment?

As a Service (SaaS)

As tool for new customers

As tool to check own installations of Firewalls, mail servers so your customers don’t get hacked

Page 17: Sec point penetrator-presentation-2010

As a Service (SaaS)

Security SaaS maturing fast Though security delivered as SaaS is still in its early stages, companies are finding that it maximizes efficiency in personnel and budget

Source: http://www.infoworld.com/article/07/08/22/Security-SaaS-maturing-fast_2.html

The Penetrator is the tool so we are ahead on others

Page 18: Sec point penetrator-presentation-2010

As a Service (SaaS)

On-demand applications regularly require information about users that can be used for financial fraud and identity theft. Following a predictable trend dating back to the invention of the spear, the bad guys have used every new technology to further their quest for profit,Source: http://www.technewsworld.com/story/55971.html

Page 19: Sec point penetrator-presentation-2010

As tool for new customers

New customers don buy if they don’t have a problem New customer don’t want to talk to you Until you show them they GOT a problem.

Offer them a (free) Security Audit so they can see what the status of their network

Page 20: Sec point penetrator-presentation-2010

As tool for new customers

If the new customers see the many risks you have foundt his is right tools for a meeting and sell him a Protector

Page 21: Sec point penetrator-presentation-2010

Are their more market for Vulnerability Assessment?

YES

I

Internet Service Providers

Financial customers

Web designers

Check other SaaS solutions

Page 22: Sec point penetrator-presentation-2010

End of Penetrator Sales Training

Q & A