Enginsight offers a comprehensive set of features for analyzing and securing your system landscape. This includes the possibility to set up automated pentests and to repeat them according to defined templates.
You will receive comparable audit reports.
May we introduce: HACKTOR
Our Hacktor is your personal pentester that can pentest all accessible assets within a network segment. It is up to you where you place a Hacktor and how many you want to operate. The Hacktor can be installed on popular Linux distributions or purchased directly from us as a preconfigured appliance. With your Enginsight account you can install as many hacktors as you like without any additional costs.
Our Asset Discovery automatically finds for you all components located in a network segment (e.g. server network or printer network) (servers, laptops, switches, printers, IoT devices, etc.).
The data from the asset discovery can then be used automatically as the basis for our pentest. A manual entry of IP addresses is of course still possible.
Furthermore, URLs to web applications can also be used for a pentest.
For each pentest you will receive a meaningful audit report. You can see immediately where action is needed.
By using templates, you can execute pentests once they have been defined again and again to verify the measures taken.
An AI-supported procedure also detects whether personal data leaves the host unencrypted.
More information: https://enginsight.com/en/features/penetration-testing/