sec point penetrator-presentation-2010
Post on 16-Jun-2015
274 Views
Preview:
DESCRIPTION
TRANSCRIPT
The Penetrator key features and sales information
Vulnerability Assessment & Penetration Testing AppliancePortable Penetration Testing & Wireless Auditing
The Penetrator & The Portable PenetratorThe Penetrator & The Portable Penetrator
Complete Penetration Testing Complete Penetration Testing
Complete Security solutionComplete Security solution
VulnerabilityVulnerabilityAssessmentAssessment
Wireless AuditingWireless Auditing
PenetrationPenetrationTestingTesting
Vulnerability AssessmentVulnerability Assessment
VulnerabilityVulnerabilityAssessmentAssessment
Security Auditing. 43.000+ Signatures. Automatic Crawl Engine to find
XSS, SQL Injection, Web errors. Unlimited Auditing. Audit any Operating System. No Software Installation. Multi User Account Support. Distributed Auditing. XML, PDF and HTML Reports. Award Winning.
Targets off Vulnerability AssessmentTargets off Vulnerability Assessment
VulnerabilityVulnerabilityAssessmentAssessment
Direct Sales As a Service (SaaS).
Optimizing security for Web designers
Optimizing Security for Web shops
Security policy for Enterprise Users
Penetration TestingPenetration Testing
Launch Real Exploits.
Launch Real Denial of Service.
Brute Force Password Files.
Crack Zip Files.
Protocol Ftp, Http... Bruteforce.
Penetration Penetration TestingTesting
Extended Penetration TestingExtended Penetration Testing
Launch Multiple Real Denial of Service attacks with Distribution setup
Penetration Penetration TestingTesting
Targets off Penetration TestingTargets off Penetration Testing
Show proof of the Assessment
Optimizing Security for Financial companies like Banks.
Security Check before a System goes online
New business for new customers
Services for Cracking Zip Files.
Penetration Penetration TestingTesting
Wireless AuditingWireless Auditing
Find open wifi networks with up to 300% range antenna range.
Find Weak Passwords. Crack WEP, WPA, WPA2. Guide to secure your Wireless
setup.
Wireless AuditingWireless Auditing
Targets off Wireless AuditingTargets off Wireless Auditing
Optimizing Security for Wifi networks
Security Second Option service Easier replace bad Wifi products
after audit.Wireless AuditingWireless Auditing
The Penetrator - Unique Selling PointsThe Penetrator - Unique Selling PointsMulti User SupportSell Security Audits as a service (SAAS)Launch Real Exploits, Denial of ServiceUnlimited security auditsFind and crack Wireless Networks43.000+ SignaturesReports in PDF, HTML, XML and syslog formatBruteforce and crack protocols, zip filesFind SQL Injection, XSS, Web ErrorsDistributed AuditingAudit any Operating SystemNo Software Installation
The Penetrator - Unique Selling PointsThe Penetrator - Unique Selling PointsEasy to useCan be used as Sensor with the Distributed setup
For Local Auditing of Servers and workstationsAll Data of the audit stays on the unit so no Vendor backdoor.
Technical info
How to Sell Vulnerability How to Sell Vulnerability Assessment?Assessment?
Where to Sell Vulnerability Assessment?
As a Service (SaaS)
As tool for new customers
As tool to check own installations of Firewalls, mail servers so your customers don’t get hacked
As a Service (SaaS)
Security SaaS maturing fast Though security delivered as SaaS is still in its early stages, companies are finding that it maximizes efficiency in personnel and budget
Source: http://www.infoworld.com/article/07/08/22/Security-SaaS-maturing-fast_2.html
The Penetrator is the tool so we are ahead on others
As a Service (SaaS)
On-demand applications regularly require information about users that can be used for financial fraud and identity theft. Following a predictable trend dating back to the invention of the spear, the bad guys have used every new technology to further their quest for profit,Source: http://www.technewsworld.com/story/55971.html
As tool for new customers
New customers don buy if they don’t have a problem New customer don’t want to talk to you Until you show them they GOT a problem.
Offer them a (free) Security Audit so they can see what the status of their network
As tool for new customers
If the new customers see the many risks you have foundt his is right tools for a meeting and sell him a Protector
Are their more market for Vulnerability Assessment?
YES
I
Internet Service Providers
Financial customers
Web designers
Check other SaaS solutions
End of Penetrator Sales Training
Q & A
top related