SECPOINT
Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products
At SecPoint our missing is to be Number #1 focus to deliver the best to the customer.
UTM firewall equipment fulfills the needs of all customers.
The most extensive and easiest vulnerability scanning device.
SECPOINT is in close contact with end customers, suppliers and distributors. This helps to understand the decisive factors required by the end customer.
SECPOINT has a dedicated team that can quickly help solve problems.
Along these directions, the fastest management and innovation can be guaranteed.
The latest generation of IT security technology
Firewall UTM-Vulnerability Scan-WiFi Security-Cloud Scan
Best Wifi Pen Testing Suite
Recover WiFi Password
WiFi Penetration Testing
WPA2 - WPA - WPS WiFi Keys
Best Vulnerability Assessment
Vulnerability Assessment
Vulnerability Management
5 Star Awarded
Best Next Generation UTM Firewall
Firewall SSLVPN UTM
Web Filtering - IPS
Bandwidth Management
Best Web Vulnerability Scanner
Web Security Scan
SQL Injection - XSS
Command Execution
The most innovative and powerful IT information security product
SECPOINT attaches great importance to privacy by providing free products in the background and does not collect any data.
Support full high performance 64-bit performance platform.
No software installation is required. Easily set up a scan plan and receive notification when new vulnerabilities are discovered on your IP.
If you are not sure about the IT information security products required for the highest security protection, please feel free to register for a free webinar for more detailed information.
SECPOINT is in close contact with distributors to obtain customer responses and provide new software updates to meet customer needs. Provide the best IT information security products for vulnerability scanning and vulnerability assessment.
Protector-high-performance UTM VPN firewall
Protector Best UTM SSL-VPN firewall provides powerful export and import network protection.
- 64 bit High performance architecture virtual and hardware devices with SSD.
- IPS - Use a powerful 64-bit intrusion prevention system (IPS) to protect your network and defend against attacks.
- Firewall - Protect the entire network. Mail loading with login hard drive-Easily store all exported and imported mail.
- VPN - SSL VPN - IPsec Lan to Lan - Client to Lan
- Anti Virus - Support multiple defenses for optimal protection: Eset - Kaspersky - ClamAV
- Anti Spam - The strongest update defense, with advanced settings, can achieve the highest spam capture the latest RBL.
- Mail Archive - Individual user login. Record all exported and imported mail on the hard disk.
- Web Filter - Block social media-dangerous sites-regular control-control of users and groups-increase productivity.
- Content Filter - Stop Bittorrent,TOR,Online games and other unwanted traffic.
- Microsoft Active Directory & Ldap Integration.
- Vulnerability Scanning - A system that discovered network vulnerabilities.
- High availability for highest security.
Penetrator - Vulnerability assessment and management solutions
Penetrator weakness scanner software and powerful network of equipment.
- 64 Bit - Virtual ESXi, Hyper-V, VMware or Hardware Appliances.
- Vulnerability scanning and vulnerability assessment.
- All information is stored in the client.
- Multi-user support.
- PDF XML HTML report.
- Report in multiple formats: technical, consultant, executive.
- Allows re-tagging of reports and interfaces.
- Scan profile-customize your own profile.
- DoS, DDoS, Exploits.
- Distributed Scanning-Centralized management of Penetrator installation.
- Scan local and public IP.
- Scan the set device for free.
- Up to 9 different scan profiles can be used to scan local and public IP addresses.
The characteristics of SecPoint IT Security products: no background, no data collection.
Portable Penetrator-WiFi penetration test password recovery
Restore WiFi WEP WPA WPA2 WPS key. Professional WiFi penetration testing software.
WiFi penetration test software-recover WPA WPA2 WPS WEP key, denial of service DoS.
Portable Penetrator ultimate WiFi penetration software. Conduct a real WiFi attack on your WiFi access point to discover vulnerabilities. Man-in-the-middle attacks, connector crawling, brute force cracking and denial of service attacks.
- WEP - WPS - WPA - WPA2 recovery.
- Supports 32-bit and 64-bit.
- Connect Handshake to capture online or offline key cracking.
- Includes a list of 110 million words.
- WiFi DoS penetration test.
- Support 2.4 GHz-5.8 GHz WiFi
- Easily connect WiFi USB connector.
- Run on a laptop for maximum mobility-Windows 10 / Mac OS X.
- Deploy the latest 7 types of WiFi password recovery technology.
- Export and import WPA WPA2 for password recovery.
- Includes more than 30 language-specific word lists.
- Import your Word list.
- Discover hidden rogue WiFi Access Points
- Custom PDF reports are provided with the results.
- Support WiFi adapters such as Alfa, TP-Link, Panda, etc.
Cloud Penetrator - Web vulnerability scanner
Use the Cloud Penetrator Best Web Security scanner to scan your public IP address for vulnerabilities.
Web security scanner-found SQL into XSS, CSRF and popular vulnerabilities.
- The minimum server impact during the scan.
- Choose from 9 scan profiles.
- Scan Popular CMS: Wordpress, Joomla, Drupal & others.
- SQL Injection Crawler.
- Cross Site Scripting XSS
- Command Execution Vulnerabilities.
- Information Leak Disclosure.
- Automatic scheduled scan.
- Automatic crawler to find unknown weaknesses.
- Custom scan to scan multiple virtual hosts.
- Detailed statistics and time comparison.
- Download all reports easily.
- Multiple report format technologies, consultants or management.
- Scan Firewalls, Mail Servers, Web Servers IoT, Windows, Linux, Mac OS X.
- The easy-to-use interface is easy to use.