SecPoint, one of Europe’s leading security systems providers, has released the Cloud Penetrator to provide full Online Web Vulnerability Scanning and SQL Injection Cross Site Scripting that prevents hackers entering web servers and stealing data.
IT service providers that used to be used by large firms are catering more and more to a mass of smaller companies keen to migrate towards cloud-based services and take advantage of cost savings, increased service and enhanced security.
But in doing so, these smaller companies are handing over key data to outside providers who are often targets for hackers looking to take whatever they can from multiple clients hosted on the same server. Hackers love multiple targets in one setting, which the cloud provides, so a cloud host could actually make data more vulnerable!
After viruses were found on servers belonging to Japanese weapons contractor, Mitsubishi Heavy Industries, in a cyber attack this week and the Sony customer credit card data theft earlier this year, both involving cloud-based systems, many companies now have serious concerns about data security and business continuity when outsourcing their websites, databases and e-commerce sections to cloud providers.
When tech-research group IDC asked businesses in 2008 what factors were most likely to discourage their use of cloud computing, 72% of small businesses and 63% of midsize companies said security was their chief worry. But by mid-2011, those numbers had dropped to 50% and 47%, respectively.
So, ask yourself – are you part of the problem or part of the solution? Many cloud-based IT services are stepping up security markedly, by finding the weaknesses in their systems and closing them before hackers can enter.
The SecPoint Cloud Penetrator’s key components identify all of these entry points hackers look for…
It scans daily; has more than 50,000 signatures that get updated regularly; includes a black-hat SEO scanner to show whether you have anything on your hosted websites that can get you delisted by search engines; it can scan websites, web shops and database servers – even if they’re firewalled – as well as routers and anything else that has a public-facing IP address. It can also scan Content Management Systems, including WordPress; as well as for SQL Injection, XSS & other web vulnerabilities.
The Cloud Penetrator provides detailed PDF Reports with clear solutions on how to fix all found vulnerabilities, with a user-friendly interface and support, including live chat.
The cost for 1 IP address for 1 year Cloud Penetrator scanning is €99 or US$129. Journalists may apply for a free test Cloud Penetrator by writing to the contact below.
Europe’s leading IT-security company SecPoint delivers specialized UTM, vulnerability management solutions with Grey Listing, Web Filter and Content Filter.
Services include Intrusion Prevention, IT Security Penetration Testing and Wi-Fi Security auditing to businesses worldwide.
Operating globally since 1999 and headquartered in Copenhagen, Denmark, SecPoint (www.secpoint.com) has been delivering high-end security products to more than 1200 customers across SecPoint Operations in the United States and Europe (SecPoint on Twitter: http://twitter.com/secpoint).