SecPoint-Cloud-Penetrator-2013

Views:
 
Category: Entertainment
     
 

Presentation Description

Cloud Penetrator Web Vulnerability Scanner http://www.secpoint.com/cloud-penetrator.html

Comments

Presentation Transcript

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® USA +1-888-704-7297 EU + 44-808-101- 2272 Victor M. Christiansenn – COO victor @secpoint.com Skype: victor_secpoint Brian Thompson – Sales Director brian@secpoint.com Skype: brian.secpoint Cloud Penetrator Web Vulnerability Scanner http://www.secpoint.com/cloud-penetrator

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® SecPoint was founded in 1999 and has 14 Years of continuous development on its Products. It is the most competitive company in the IT Security field with a wide range of products, including UTM’s, Pen-Testing Products and Cloud Services, offering easy to use solutions for every IT security need. SecPoint first designed Penetrator in 2003, Protector UTM in 2005 and Portable Penetrator in 2007. Since then, there has been continual development across all three variations with many firmware updates offering new and exciting features. SecPoint has been operating globally since 1999 and is headquartered in Copenhagen, Denmark. It has been delivering high-end security products to customers worldwide, via offices in Denmark, Sweden, Italy, Netherlands and Greece. We currently have a channel of 500+ partners across the globe. We currently have and growing 1200+ Protector Customers and 1600+ Penetrator Customers who rely on SecPoint’s advanced IT Security Products for the smooth operation of their business. About SecPoint

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® - June , 2013 Edward Joseph Snowden reveals secret PRISM spy Program - Bloomberg , June 2013 - U.S. Agencies Said to Swap Data With Thousands of Firms SecPoint was founded in 1999 in Denmark as a private independent company. SecPoint takes Privacy very seriously and are in no way affiliated with any Governments, Intelligence Agencies such as (NSA, CIA or any other agency), Big Corporations. There has been rumors and recently leaked Top Secret programs such as Prism that forces several governments and agencies to have direct access to software, hardware, wire tapping including Security Products. This allows them to spy on all the data without a warrant or the users even knowing about it. The SecPoint Products: Protector - UTM Firewall, Penetrator - Vulnerability Scanner, Portable Penetrator - Wifi Auditor, Cloud Penetrator – Web Vulnerability Scanner comes with NO Government backdoors and are closed by design. We at SecPoint can not even access the products remotely doing support without being granted access. We are not affiliated with any governments enforcing backdoors in our software. Independent Security Company

PowerPoint Presentation:

2005 2007 2008 2011 1999 2001 2003 Worlds First Pen Testing Appliance Worlds First Wi-Fi Security Software Portable Penetrator Beaten Cisco, Checkpoint, Fortinet in Infosec, DTL test SecPoint Nederland 5 Star SC Magazine Awards Virtually for VMware, Hyper-V SecPoint Italy SecPoint India Released SecPoint VIP Lounge for growing partners SecPoint Greece Cloud Penetrator Web Vulnerability Scanner Protector UTM Worlds First Advanced Anti Spam SecPoint Founded Security Conulting Penetration Tests SecPoint Denmark SecPoint – History Timeline 2013 Worlds First Vulnerability Scanning for UTM Firewall 2009 SecPoint Sweden SecPoint Ukraine SecPoint USA

PowerPoint Presentation:

1999 SecPoint – World Offices 2007 2008 2009 2011 SecPoint have regional offices in Europe, Asia and the Americas. Giving the best and fastest good support is a very high priority for SecPoint. Having worldwide presence allows for best local support in multiple languages world wide. For updated full contact information please visit: http://www.secpoint.com/ contact.html

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Customer’s Satisfaction – Our Strength Customers Awards and Reviews

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® More Satisfied Customer across the globe Volga Telecom Devon Credit FSUE State ATM Corporation Rostelecom Russia & CIS EMEA

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Hacker's attacks area cost to organizations that can have several consequences such as: Loss of reputation and trust gives harm to brand. Loss of customer confidence , revenue, profitability and reputation. Loss of ability to accept payment options via VISA, Mastercard and other credit cards. Employee downtime that can result in production loss. Website downtime effecting Google ranking and loss of new customer leads. Legal consequences for loosing confidential customer data result in fines and damages to be paid. 2010 Cost According to Ponemon Institute 318$ per compromised record. Cost and Risk of Websites being hacked

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® There are about 4 - 6 ,000 new software vulnerability disclosures every year according to official numbers. For unofficial numbers and black market it can be higher such as 5-7000 vulnerabilities. New Vulnerabilities Discovered

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Cyber Weapon Of Mass Destruction - The Blackhole Exploit Kit Washington Hospital Hit By $1.03 Million Cyberheist Oracle Updates Java Versioning To Allow More Security Fixes US Data Breach Exposes 160,000 Social Security Numbers Microsoft Fixes 33 Issues Next Tuesday China Accounts For 41% Of Global Computer Attack Traffic The great $45m bank cyber-heist: Seven New Yorkers cuffed c Recent IT Security Headlines in 2013

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Some Websites which got hacked Ferrari Hacked in 2013 c

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Some Websites which got hacked NBC Hacked in 2013 c

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Vatican Being hacked in 2012 Some Websites which got hacked c

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Remote Code Execution - C an allow attackers to execute code on the target system and lead to a full compromise SQL Injection - Old attack form but still very popular. Allows an attacker to retrieve sensitive information from a web servers database. can result in full system compromise. Cross Site Scripting (XSS) - Attackers trick the victim to execute malicious URL that may appear legitimate at first look. Format String vulnerabilities - This is due to bad programming, can allow an attacker to print data from locations in the memory. Can also allow write arbitrary data to compromise the target system. c Common Types of Security Problems

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Username Enumeration - Allows an attacker to guess real users on the target and might lead to other attacks. Denial of Service DoS attacks - Allows an attacker to shutdown or prevent a web server from serving the purpose. This can block a site from receiving orders as an example. Human mistakes - This can allow attackers to reveal sensitive files or directories that by human mistakes and bad configurations. Sensitive Information Leaking - Leaking of sensitive information to search engines such as Google and Bing. Common Types of Security Problems

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Cost and Risk of Websites being hacked Security SaaS maturing fast Though security delivered as SaaS is still in its early stages, companies are finding that it maximizes efficiency in personnel and budget Source: http://www.infoworld.com/article/07/08/22/Security-SaaS-maturing-fast_2.html The Penetrator is the tool so we are ahead on others

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Scanning for: SQL Injection XSS Cross Site Scripting Format String Vulnerabilities Command Execution Joomla,Wordpress Security Scanner Google Security Scanner SEO Bblackhat Scanner Username Guessing Denial of Service DoS 60.000+ Security Checks. Profile Scanning Information Disclosure Cloud Penetrator in Operation

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Cloud Penetrator Diagram

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Free Vulnerability Scan New customers don buy if they don’t have a problem New customer don’t want to talk to you Until you show them they GOT a problem. Offer them a (free) Security Audit so they can see what the status of their network http://www.secpoint.com/free-vulnerability-scan.html

PowerPoint Presentation:

Pen-Testing over Cloud – Cloud Penetrator Cloud Solution to Find Loopholes and Dangerous content inside a website. Targeted to customers from Small and Medium Business Segment. Copyright © 1999-2013 SecPoint®

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® How to scan the correct way Automatic Daily or Weekly comprehensive security scanning of all public and local Show Interface on https://penetrator.secpoint.com How to scan correctly with profiles

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Automatic Daily or Weekly comprehensive security scanning of any Public or Local IP Show Interface on https:// penetrator.secpoint.com Setup Automatic Scheduled Scan

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Cloud Penetrator Interface

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® SAMPLE VULNERABILITY SCANNING Summary Report http ://www.secpoint.com/manual/ Penetrator_Example_Audit_Summary.pdf Example Reporting

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® SAMPLE VULNERABILITY SCANNING FULL Report http :/ /www.secpoint.com/manual/Penetrator_Example_Audit.pdf Example Reporting

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Cloud Penetrator License Overview

PowerPoint Presentation:

Copyright © 1999-2013 SecPoint® Questions and Answers

authorStream Live Help