Learn more about the SecPoint IT Security Products.

 Portable Penetrator – Wifi Password Recovery WEP WPA WPA2 WPS.

wpa cracker

Wifi Security Software – Wireless Security Assessment Tool

Prevent hackers from entering your Wifi Networks!
Portable Penetrator Solves all your Wi-Fi security problems. Make your Wi-Fi networks secure today!

wpa crack Portable Penetrator Brochure  wpa crack Portable Penetrator Datasheet

Protector UTM Appliance – Give you complete network security and control.

network security utm firewall

Prevent Spam,Virus,Hackers,Worms from entering your network with Protector UTM Firewall!
The Protector solves all your spam, virus and security problems for the entire network with one appliance!

With the Protector UTM FIrewall you can protect your whole network.

You get State of the art Next gen Firewall, VPN with IPsec, Best Anti Spam with less false positives.

The Anti Virus supports multiple engines for best Virus Scanning. Web Proxy and Web Filtering.

Easy Graphics User Interface GUI and live chat support is included.

utm appliance Protector Brochure utm appliance Protector Datasheet

Penetrator Vulnerability Scanner – Scan your whole network for vulnerabilities and resolve them.

vulnerability scanning

With Penetrator Vulnerability Scanning Appliance you can deploy it in your network.

You can scan Local and Public IP addresses. You will get detailed reporting in PDF,HTML or XML.

It contains clear solutions fo the found problems.

You can easily setup scheduling and get notification once new vulnerabilities gets discovered.

vulnerability scanning Penetrator Brochure  vulnerability scanning Penetrator Datasheet

Cloud Penetrator – Easily Scan your Web site, Web shop for vulnerabilities SQL Injection, XSS and more.

. Unlimited scanning of 1 IP for 6 months

With Cloud Penetrator you can scan your Web Site, Web Shop or any site you have with a Public IP address.

You do not need any software and you can instantly get an account on the Cloud Penetrator.

You simple login and start the scans via a user friendly interface.

You can schedule the scans to automatically scan and notify you when new vulnerabilities are identified.

It scans for more than 55.000+ remote vulnerabilities including web crawler, SQL injection, XSS, Cross SIte Scripting.

Command Execution, File inclusion vulnerabilities and much more.

Joomla Security Scan.

vulnerability scanning Cloud Penetrator Brochure  vulnerability scanning Cloud Penetrator Datasheet