Leading security system’s products now available virtually

Administrators who require advanced protection for corporate systems against hackers and malicious software can now download Secpoint’s products rather than buy and install hardware versions.

Major benefits of using SecPoint’s products via VMware include free demo testing, instant downloads, lower entry costs and a centralised marketplace…

The first products to be available virtually from SecPoint include:

The Penetrator Vulnerability Scanner
Store: http://alliances.vmware.com/public_html/catalog/ViewProduct.php?Id=a045000000GPJQwAAP
Home: http://www.secpoint.com/penetrator.html

This is an advanced penetration testing system for corporate IT clients. SecPoint’s Penetrator guards against the most common attacks to large-scale businesses, including SQL injection and Cross Site Scripting via its automatic crawl engine as well as scanning for Web Application Firewalls.

SecPoint CEO Victor Christiansenn says the first step anyone should take to secure their business is to do a risk assessment to identify threats and vulnerabilities to their IT infrastructure.

“With targeted attacks on the rise and web applications the focus of criminal gangs, testing your network with the Penetrator will help any firm deal with the increasing threat of confidential data theft and ensure its security,” he advises.

Protector UTM Anti Spam Anti Virus
Store: http://alliances.vmware.com/public_html/catalog/ViewProduct.php?Id=a045000000GPJMpAAP
Home: http://www.secpoint.com/protector.html

The Protector enables corporate customers to protect their businesses from escalating network threats at a time when the volume, severity and sophistication of attacks have never been greater. The security suite includes a firewall, intrusion detection system, network access control, spam filtering, anti-virus protection and web filtering, protecting data centres and larger networks in real-time.

Portable Penetrator Wifi Security wepcrack wpacrack
Store: http://alliances.vmware.com/public_html/catalog/ViewProduct.php?Id=a045000000GPJR1AAP
Home: http://www.secpoint.com/portable-penetrator.html

The Portable Penetrator Wi-Fi Audit system can keep corporate networks secure against external attack, allowing browser-based wireless vulnerability scanning of very large networks across hundreds of IP addresses simultaneously. It can also crack security keys encrypted with WEP, WPA or WPA2.

“We continue to see, week-after-week, how corporate computers connected to external networks fall foul of various security breaches after their Wi-Fi keys are cracked,” explains Christiansenn. “The Portable Penetrator identifies all of these danger zones and provides essential advice how to fix the holes.”

The Penetrator provides the names of all identified networks in range, their types of encryption, signal strengths and their number of connected users. Administrators can then launch a wide variety of attacks, including denial of service, against any of these networks. The latest version includes more than 50 languages and can run 250 keys per second across a WPA-encrypted network, until the password is identified. It can now identify more than 42,000 remote unique security vulnerabilities.

Prices for these SecPoint products start from just €150 or US$195.

About VMware

VMware software provides a completely virtualised set of hardware to the guest operating system. The host provides pass-through drivers for guest USB, serial, and parallel devices.

In this way, VMware virtual machines become highly portable between computers, because every host looks nearly identical to the guest. In practice, a system administrator can pause operations on a virtual machine guest, move or copy that guest to another physical computer, and there resume execution exactly at the point of suspension.

Alternately, for enterprise servers, a feature called VMotion allows the migration of operational guest virtual machines between similar but separate hardware hosts sharing the same storage. Each of these transitions is completely transparent to any users on the virtual machine at the time it is being migrated.

Notes to editors:

Europe’s leading IT-security company SecPoint delivers specialized UTM, vulnerability management solutions with Grey Listing, Web Filter and Content Filter.

Services include Intrusion Prevention, IT Security Penetration Testing and Wi-Fi Security auditing to businesses worldwide.

Operating globally since 1999 and headquartered in Copenhagen, Denmark, SecPoint has been delivering high-end security products to customers worldwide, via SecPoint outlets in the United States and Europe.

For further information, please contact:

Victor Christiansenn
[email protected]
Tel: +45-40 90 16 30


For the latest news follow SecPoint on: