July 5, 2023 - Cybersecurity has become strategic for the survival of companies. All companies already know that they have to invest in firewalls, antivirus and other tools. But are they really safe?
Our company has been working with Secpoint (Danish company), for more than 6 years, in cybersecurity audits with the Penetrator. It is an automatic ethical hacking system that allows you to quickly analyze whether the company's infrastructure is robust enough to resist the attacks that hackers are continually carrying out.
It must be taken into account that in this cybersecurity you not only have to invest, you also have to do it well.
But how to verify then that the company is safe? It is best to hire an independent audit service to verify that the protections have been correctly implemented.
In addition, and if the company or public administration is very large and has hundreds or thousands of jobs. Could it not be that threats enter through these computers as well?
On the other hand, and around the modernization of industrial networks (eg SCADAS/PLCs) and smartcities (IoT), these scenarios are also being exploited by hackers to find vulnerabilities.
Well, to study how robust our IT systems and the communications that support them are, the Penetrator allows attacks from outside and also from within the company.
It is important to note that the detection of attack vectors by a hacker can take several hours of team work, so few companies can afford to hire people (manual systems) to detect vulnerabilities. This is why it is very interesting to have some automatic system that allows this type of work to be carried out more or less automatically. This is precisely what the Penetrator does.
The V56 version of the Penetrator has recently been released and has multiple features/improvements:
Aplicaziones provides its clients with the use of Penetrator in service mode, so that the audit is carried out by our company personnel and it is also possible to sell the Penetrator (physical or virtual machines) so that it is the client's own personnel (duly formed) who performs the audit work.
Finally, it should be noted that the Penetrator is in the Incibe cybersecurity product catalog
More information about our Cybersecurity solutions can be found on our website