Download - Sec point penetrator-presentation-2010
![Page 1: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/1.jpg)
The Penetrator key features and sales information
![Page 2: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/2.jpg)
Vulnerability Assessment & Penetration Testing AppliancePortable Penetration Testing & Wireless Auditing
The Penetrator & The Portable PenetratorThe Penetrator & The Portable Penetrator
![Page 3: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/3.jpg)
Complete Penetration Testing Complete Penetration Testing
Complete Security solutionComplete Security solution
VulnerabilityVulnerabilityAssessmentAssessment
Wireless AuditingWireless Auditing
PenetrationPenetrationTestingTesting
![Page 4: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/4.jpg)
Vulnerability AssessmentVulnerability Assessment
VulnerabilityVulnerabilityAssessmentAssessment
Security Auditing. 43.000+ Signatures. Automatic Crawl Engine to find
XSS, SQL Injection, Web errors. Unlimited Auditing. Audit any Operating System. No Software Installation. Multi User Account Support. Distributed Auditing. XML, PDF and HTML Reports. Award Winning.
![Page 5: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/5.jpg)
Targets off Vulnerability AssessmentTargets off Vulnerability Assessment
VulnerabilityVulnerabilityAssessmentAssessment
Direct Sales As a Service (SaaS).
Optimizing security for Web designers
Optimizing Security for Web shops
Security policy for Enterprise Users
![Page 6: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/6.jpg)
Penetration TestingPenetration Testing
Launch Real Exploits.
Launch Real Denial of Service.
Brute Force Password Files.
Crack Zip Files.
Protocol Ftp, Http... Bruteforce.
Penetration Penetration TestingTesting
![Page 7: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/7.jpg)
Extended Penetration TestingExtended Penetration Testing
Launch Multiple Real Denial of Service attacks with Distribution setup
Penetration Penetration TestingTesting
![Page 8: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/8.jpg)
Targets off Penetration TestingTargets off Penetration Testing
Show proof of the Assessment
Optimizing Security for Financial companies like Banks.
Security Check before a System goes online
New business for new customers
Services for Cracking Zip Files.
Penetration Penetration TestingTesting
![Page 9: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/9.jpg)
Wireless AuditingWireless Auditing
Find open wifi networks with up to 300% range antenna range.
Find Weak Passwords. Crack WEP, WPA, WPA2. Guide to secure your Wireless
setup.
Wireless AuditingWireless Auditing
![Page 10: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/10.jpg)
Targets off Wireless AuditingTargets off Wireless Auditing
Optimizing Security for Wifi networks
Security Second Option service Easier replace bad Wifi products
after audit.Wireless AuditingWireless Auditing
![Page 11: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/11.jpg)
The Penetrator - Unique Selling PointsThe Penetrator - Unique Selling PointsMulti User SupportSell Security Audits as a service (SAAS)Launch Real Exploits, Denial of ServiceUnlimited security auditsFind and crack Wireless Networks43.000+ SignaturesReports in PDF, HTML, XML and syslog formatBruteforce and crack protocols, zip filesFind SQL Injection, XSS, Web ErrorsDistributed AuditingAudit any Operating SystemNo Software Installation
![Page 12: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/12.jpg)
The Penetrator - Unique Selling PointsThe Penetrator - Unique Selling PointsEasy to useCan be used as Sensor with the Distributed setup
For Local Auditing of Servers and workstationsAll Data of the audit stays on the unit so no Vendor backdoor.
![Page 13: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/13.jpg)
Technical info
![Page 14: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/14.jpg)
![Page 15: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/15.jpg)
How to Sell Vulnerability How to Sell Vulnerability Assessment?Assessment?
![Page 16: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/16.jpg)
Where to Sell Vulnerability Assessment?
As a Service (SaaS)
As tool for new customers
As tool to check own installations of Firewalls, mail servers so your customers don’t get hacked
![Page 17: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/17.jpg)
As a Service (SaaS)
Security SaaS maturing fast Though security delivered as SaaS is still in its early stages, companies are finding that it maximizes efficiency in personnel and budget
Source: http://www.infoworld.com/article/07/08/22/Security-SaaS-maturing-fast_2.html
The Penetrator is the tool so we are ahead on others
![Page 18: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/18.jpg)
As a Service (SaaS)
On-demand applications regularly require information about users that can be used for financial fraud and identity theft. Following a predictable trend dating back to the invention of the spear, the bad guys have used every new technology to further their quest for profit,Source: http://www.technewsworld.com/story/55971.html
![Page 19: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/19.jpg)
As tool for new customers
New customers don buy if they don’t have a problem New customer don’t want to talk to you Until you show them they GOT a problem.
Offer them a (free) Security Audit so they can see what the status of their network
![Page 20: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/20.jpg)
As tool for new customers
If the new customers see the many risks you have foundt his is right tools for a meeting and sell him a Protector
![Page 21: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/21.jpg)
Are their more market for Vulnerability Assessment?
YES
I
Internet Service Providers
Financial customers
Web designers
Check other SaaS solutions
![Page 22: Sec point penetrator-presentation-2010](https://reader035.vdocuments.mx/reader035/viewer/2022062405/557f6777d8b42aab368b4815/html5/thumbnails/22.jpg)
End of Penetrator Sales Training
Q & A