Your Safety Inspector

Easy to install, Easy to use.

Through continuous innovation, HACK INSPECTOR was designed, an innovative device created by the HACK&SECURE safety team to increase safety levels and implement international standards based on the ISO27001:2013 standard. With a simple and practical WEB interface, the client will be able to configure: Alerts, monitoring, scans to its infrastructure, manage its assets, incidents and users, perform self-management of the standard iso27001:2013, all this without having previous knowledge.

Currently, the high costs of hiring Cyber Security services and information security are beyond the reach of small and medium enterprises globally, thus preventing, improve their processes, ensure and comply with local and international regulations in force. For this reason, Hack Inspector, will be the perfect ally, at very low cost, can implement the continuous cycle of security in your organization and have adequate standards that allow you to be competitive and avoid sanctions.

DESCRIPTION OF FUNCTIONALITIES

WIFI Monitoring

Asset Management

Network Scanning

Incident Management

WEB Scanning

User Management

BACKUP

DEFACEMENT

FORMATS

UPDATE

ALERTING OF UNKNOWN COMPUTERS ON THE NETWORK

EARLY WARNING OF VULNERABILITIES

WIFI MONITORING

Inspects your company's wireless network, to prevent or detect threats in real time, some of the threats that the HACK INSPECTOR can detect and alert are:
– Flooding of associations and authentications against the access point.
– Detect massive deauthentication.
– Detect WEP attacks.
– Detect WPS attacks by brute force.
– Detect false access points.

Every time HACK INSPECTOR detects a threat described above on your wireless network, it will send a notification via email.

WEB SCANNING

HACK INSPECTOR will perform a vulnerability scan on your business or personal web portal, which will attempt to look for faults in your portal to prevent injections, information leaks, etc. based on international standards such as OWASP TOP 10.

The result of the scan will be stored inside the device, so that it can be seen in a practical way through the WEB.

interface.

WEB SCANNING

HACK INSPECTOR will perform a vulnerability scan on your business or personal web portal, which will attempt to look for faults in your portal to prevent injections, information leaks, etc. based on international standards such as OWASP TOP 10.

The result of the scan will be stored inside the device, so that it can be seen in a practical way through the WEB.

interface.

NETWORK SCANNING

HACK INSPECTOR will analyze your internal infrastructure (computers, printers, routers, etc.) for exposed ports and vulnerabilities associated with them.

For its correct operation, the client will have a manual and the support of the technicians of HACK&SECURE.

ALERTING OF UNKNOWN COMPUTERS ON THE NETWORK

Hack Inpector, will inspect the network, to identify the connected equipments, these equipments will be visualized from the Hack Inspector administration web console, where the user will be able to create a white list.
In operation, the Hack Inspector will periodically identify the equipment in the network, if there is a device that is not on the white list, the Hack Inspector will generate an alert.

ALERTING OF UNKNOWN COMPUTERS ON THE NETWORK

Hack Inpector, will inspect the network, to identify the connected equipments, these equipments will be visualized from the Hack Inspector administration web console, where the user will be able to create a white list.
In operation, the Hack Inspector will periodically identify the equipment in the network, if there is a device that is not on the white list, the Hack Inspector will generate an alert.

.

EARLY WARNING OF VULNERABILITIES

Every day new vulnerabilities are reported that affect the technological assets of companies, and keeping abreast of these vulnerabilities is a repetitive and tedious job, thanks to the functionality of early warning of vulnerabilities, HACK INSPECTOR, daily extracts the latest vulnerabilities reported to the NVD (NATIONAL VULNERABILITY DATABASE) of NIST (National Institute of Standards and Technology), translates them into Spanish and generates alerts via email if any of the technological assets registered in the HACK INSPECTOR is affected by such vulnerabilities.

ASSET MANAGEMENT

Manage from the same Interface the information assets present in the organization. Centralize in one place all your information.

ASSET MANAGEMENT

Manage from the same Interface the information assets present in the organization. Centralize in one place all your information.

SECURITY INCIDENT MANAGEMENT

With The HACK INSPECTOR ensures that incidents related to products and processes are dealt with appropriately and efficiently through an integrated process that monitors and manages the entire incident lifecycle, from initial recording, through investigation, cause analysis, resulting actions, to verification of effectiveness.

USER MANAGEMENT

With the HACK INSPECTOR you will be able to manage the users and the accesses to the different functionalities in a local system.

USER MANAGEMENT

With the HACK INSPECTOR you will be able to manage the users and the accesses to the different functionalities in a local system.

ISO 27001:2013 COMPLIANCE SELF-MANAGEMENT

With the HACK INSPECTOR you will be able to manage the global compliance level of the ISO 27001:2013 Standard, for each one of the Items, identifying in a managerial and graphical way the current state within the organization.

>

FORMATS

With the formats function, our customers will be able to transform any pendrive (usbs, hard drives, etc.) connected to the hack inspector into a private cloud to share formats, videos, news, etc. in a secure, local and controlled way, thanks to the integrated user management.
In this way the process of access to formats established by the organization will be more efficient by improving good information security practices.
This functionality can also be used as intranet, file repository, internal training and any idea that is within the functionality that the customer can think of.

FORMATS

With the formats function, our customers will be able to transform any pendrive (usbs, hard drives, etc.) connected to the hack inspector into a private cloud to share formats, videos, news, etc. in a secure, local and controlled way, thanks to the integrated user management.
In this way the process of access to formats established by the organization will be more efficient by improving good information security practices.
This functionality can also be used as intranet, file repository, internal training and any idea that is within the functionality that the customer can think of.

AUDIT LOGS

The administrator of the Hack Inspector, will be able to consult the accesses to the device by the other users at any time, thus carrying out an audit control, where the user name, the time and date of the access is evident, accompanied by the user management, will be able to increase the security levels when validating the access.

UPDATE

Thinking of the continuous improvement of the Hack&Secure team, added an upgrade functionality to the Hack Inspector, which will allow it to be scalable at any time, allowing users to customize their devices to suit their requirements, Hack&Secure, will release new plugins with new features or improvements that customers can download from its official site and upload to the Hack Inspector.

UPDATE

Thinking of the continuous improvement of the Hack&Secure team, added an upgrade functionality to the Hack Inspector, which will allow it to be scalable at any time, allowing users to customize their devices to suit their requirements, Hack&Secure, will release new plugins with new features or improvements that customers can download from its official site and upload to the Hack Inspector.

Watch video demo

Get your Hack Inspector now!

Send us a message!

Contact us!

+57 1 4322796

comercial@hackandsecure.com.co

Cl 26 #68C 61 OFC 204, Edificio Torre Central Davivienda. Bogotá, Colombia.