The Penetrator Vulnerability Scanner 8.2.1

"The Penetrator Vulnerability Scanner" snapshot

Penetrator Vulnerability Scanner is a complete solution for thoroughly scanning your company's network including all of its clients, servers and devices for vulnerabilities. It automates the process, saving huge amounts of manual labor.

Advertising
Software information
Platform:
Windows Vista/XP/2000/Server/95/98, Unix/Linux, Mac OS
Publisher:
SecPoint ApS
Price:
$195
File size:
26.86 Mb
Date added:
July 7, 2011
Screenshot:
Product page:
Description from the Publisher
Penetrator Vulnerability Scanner is a full solution for thoroughly scanning your corporate network. The program scans all of its clients, servers and devices for vulnerabilities. It automates the process, saving huge amounts of manual labor and costs and it minimizes the risk of human error. This way, network administrators will be able to ensure that their networks are kept safe from unwelcome visitors, hackers and malicious software.
Users reviews & testimonials

This software is not reviewed yet.

Advertising
Other downloads from this publisher

Portable Penetrator is a complete solution for securing your wireless network and identifying any security flaws before hackers have a chance to do so. This wifi security software provides detailed reports, exposing security issues quickly.

Unified threat management such as the Protector from Secpoint allows you to secure your entire company network and protected it from hackers and malware with a single appliance.

Google Hack Database is a completely free IT security tool which allows you to scan your web addresses for major vulnerabilities and match them to those found in the popular Google Hack Database.

Netbios Share Scanner is a completely free network share scanner from one of the leading IT security software developers. It runs on both Linux- and Windows-based systems.

TCP Port scanner Multi threaded with possibility to scan 65535 TCP ports on an IP address. You can specify how many threads to run and the timeout. Further more it will tell you the MAC address of the target and the service running.