VAPT FAQ
Frequently Asked Questions (FAQ)
Is the SecPoint Penetrator the right solution for all VAPT requirements?
Yes, SecPoint is very robust. We recommend to speak to our experts for for details.
What is system requirement for Penetrator Appliance?
SecPoint comes as Virtual as well as hardware appliance. Virtual Appliance can be installed on entry level Win 10 PC too. Although depending on network size / concurrent scanning, more RAM & CPU may be required.
Can I setup multiple users & multiple locations on a Penetrator Appliance?
Yes you can create multiple accounts with access to different IP addresses.
You may also set multiple groups and locations, setting master-client architecture.
Any client references?
See what the customers are saying about the Penetrator: Penetrator references and testimonials
What Operating systems can I scan with Penetrator?
You can scan anything with an IP address. You can scan both local and public IP addresses. The operating systems includes Windows, MacOS, Linux,BSD, Unix, Aix, and many others. You can also scan routers, VoIP, firewalls and any network device.
How do I install the Penetrator on the network?
The Penetrator is very easy to install. It can be placed anywhere on your LAN or on supported cloud. SecPoint is plug-and-play, so it’s ready to work as soon as you connect it to the LAN and turn it on.
Our technicians will assist you setting up everything for you and will also train you to use SecPoint appliance effectively.
SecPoint Penetrator Technical Information
- Powerful 64 Bit Virtual, Hardware appliances.
- Virtual 64 Bit Hyper-V, ESXi, VMware & Linux ISO.
- High Powerful 64 bit multi core CPU support
- All models come with a fully featured hard drive Minimum 300 gig size. In Larger models with SSD for increased speed. In many competitors you only get 32/64 gig flash and only larger models support hard drives but they get very expensive.
- Not limited to ASIC structure but real Linux server system that allows for full future upgrades.
- Can be placed in any network environment.

SecPoint Penetrator White Paper
In-depth on the SecPoint Penetrator Vulnerability Management
The SecPoint Penetrator is a vulnerability scanning device that simulates how a hacker could penetrate a given system (hence the term) and reports vulnerabilities, which should then help strengthen security measures against online outlaws, virtual villains, cyber criminals, techno terrorists, and other nefarious elements of the Worldwide Web at large.
To be more specific, vulnerabilities are the holes and coding flaws that hackers exploit so that they could wreak havoc on any supposedly secure website or domain. Their malware programs will likelier gain access to a given network if they could identify vulnerabilities that the network owner neglected to find. Therefore, the Penetrator is an essential reporting device that records in XML, HTML, and PDF all those minor-to-critical vulnerabilities before these online outlaws do.
What SecPoint can Scan?
The SecPoint Penetrator can scan most everything from public to local IP addresses. It’s the penetrative scanner you require in order to guarantee that your security is “airtight” and “hacker-proof”. Most importantly, the SecPoint Penetrator is a device that evolves alongside security technology, so you’ll never end up with an obsolete appliance that requires replacement post-haste. The reason for that is because the Penetrator regularly connects to the Internet in order to get the latest security updates around.
If there are white hat hackers who’ve recently uncovered some sort of vulnerability for whatever program or safety protocol around, you can rest assured that the Penetrator will be right on the case. Vendors will more likely have vulnerabilities patched immediately as long as their customers are aware of the danger and clamoring for action.
Is VAPT really helpful?
If you want to make sure that your network is secure instead of enjoying a false sense of security that will lull you into complacency until it’s too late and you’ve already been hacked, then it’s imperative that you go through penetration testing via the vulnerability assessment capabilities of the securely designed, user-friendly Penetrator.
Vulnerability Scanning Vulnerability Assessment Penetration Testing Application Security Denial of Service DoS Tests Buffer Overflow Attacks Brute Force attacks With the 256 IP Penetrator Appliance you can scan 256 IP addresses at the same time via the vulnerability scanning.
Describe SecPoint Features
With its all-inclusive vulnerability database and the application of sophisticated auditing techniques, Penetrator enables you to always be one step ahead of even the most skilled and advanced hackers. It has no limit on the amount of auditing you can do. Easily choose the number IPs you want to scan. Therefore, it is most certainly one of the strongest and most comprehensive vulnerability assessment solutions on the market today.
SecPoint comes fully loaded with Vulnerability Scanning Capabilities.
Penetrator offers the best technology to doing vulnerability scanner. It will scan Routers, Firewalls, Windows, Linux, MacOS, IP Telephones any system with an IP address for vulnerabilities.
High Power 64 Bit Multi Core architecture.
Easy Graphics User Interface GUI and live chat support is included.
What information and data SecPoint gathers from my network?
No backdoors – No information collection – All data stored at customer location.