Infiltrator

Infiltrator

Infiltrator serves as an intuitive network security scanner that efficiently audits computers for vulnerabilities and information enumerations. It identifies installed software, shares, users, and open ports while evaluating password and security policies. Its report generator produces sleek summaries, complemented by over 15 robust utilities for effective network footprinting and scanning tasks.

Top Infiltrator Alternatives

1

empow

Designed from the ground up, this innovative SIEM merges a rules-free engine with an extensive, continuously updated threat database.

2

Secure My Files

Secure My Files Mini (SMF) is a JavaScript library designed for secure document handling through end-to-end encryption directly in the browser.

By: SecuSimple
3

PerfectMail Antispam

PerfectMail Antispam offers a robust solution for organizations seeking reliable email protection without the burden of maintenance.

By: PerfectMail
4

Intelligent Technologies Labs

With years of experience and a track record of happy clients, this innovative firm empowers organizations to enhance operational efficiencies and achieve consistent business outcomes.

By: Intelligent Technologies Labs
5

Apparity

Harnessing cloud technology, this IT Risk Management Software creates a thorough inventory of End User Computing (EUC) applications, models, and digital assets.

By: Apparity From United States
6

NTFS Permissions Auditor

NTFS Permissions Auditor simplifies the auditing of directory permissions across Windows systems.

By: Albus Bit From Latvia
7

eramba

Built by a community of CISOs, it streamlines processes like PCI-DSS certification and SOC2 reporting...

By: eramba From United Kingdom
8

OpenContext

By uniting the socio-technical stack, it creates a real-time graph of code and cloud artifacts...

By: OpenContext From United States
9

SecurityPal

SecurityPal's Concierge Team expertly navigates complex security questionnaires, ensuring timely and accurate responses tailored to...

By: SecurityPal SOCC From United States
10

Pellonium

It empowers security teams to make informed, evidence-based decisions, optimizing resource allocation and enhancing resilience...

By: Pellonium From United States
11

Monad

Its user-friendly platform allows teams to ingest data from security tools in minutes, filter out...

By: Monad From United States
12

Perfecto Encryptor

It enhances privacy by cleaning caches, temporary files, and cookies across over 50 browsers while...

By: Black Bird Cleaner Software From Ukraine
13

DataStealth

By ensuring PCI compliance across any consumer browser and payment page, it reduces audit scope...

By: Datex From Canada
14

CloudFish

It ensures that critical information, from intellectual property to customer details, remains secure across employees’...

By: CloudFish From United States
15

Data Rover

It efficiently addresses the dual challenges of cyber security and data management, enabling users to...

By: DATA ROVER From United Kingdom