A plug & play appliance or virtual machine & three powerful security modules - for an all-round cyber-secure IT infrastructure!
The DEFENDERBOX carries out weekly, fully automated security analyses of your entire IT infrastructure - specifically tailored to the requirements of industrial environments. Identified vulnerabilities are recorded and prioritized in a structured manner. We then explain the relevance of the findings in a technical review and discuss suitable measures to reduce risk and improve the IT security situation.
The DEFENDERBOX protects your sensitive production data and trade secrets from industrial espionage.
The DEFENDERBOX checks all Network segmentation for the separation of critical systems.
The simple installation of the DEFENDERBOX provides a normal business operations without interruption.
as with
Targeted checks on the Darknet for company data, compromised email addresses and passwords.
The weekly DEFENDERBOX evaluations are tailored to the requirements of the management and the IT department: once short & crisp - once detailed & specific!
The DEFENDERBOX report contains precise recommendations on how to close the security gaps.
The security gaps found are prioritized precisely. This means you know which gaps need to be closed first.
DEFENDERBOX reporting is part of the statutory audits for NIS-2, DORA or ISO27001.
On-premise, multi-cloud, hybrid IT - the DEFENDERBOX moves seamlessly between environments.
DEFENDERBOX's external vulnerability analysis systematically checks your IT infrastructure for security gaps and inefficient processes in order to identify risks at an early stage.
DEFENDERBOX's automated external pentest efficiently checks your external IT infrastructure for security gaps, assesses risks and continuously monitors security.
DEFENDERBOX's automated internal pentest efficiently checks your company network for security vulnerabilities, reduces costs and delivers reproducible test results.
DEFENDERBOX's darknet research specifically investigates activities on the darknet, uses specialized tools such as Tor and checks email addresses for data leaks.
Vulnerability analysis, internal & external pentests - for the cyber security of the entire IT infrastructure - including alerts in the event of serious new security vulnerabilities.
The DEFENDERBOX is a simple plug-and-play solution for IT security. As a Managed Security Service it checks your systems automatically and continuously - both from the outside and from the inside.
one-time
monthly for 100 IPs
applies to 100 IPs plus one-off setup fee of €249
The DEFENDERBOX checks all IP addresses of a network and also cloud-based devices. However, these must be switched on. Nevertheless, you can define exactly which VLAN is scanned and which is skipped in the first (or second) step. In any case, you get a complete overview of your company's security situation.
All checks are carried out in accordance with the highest security standards. No data is deleted or changed, and sensitive information is transmitted in encrypted form. Your systems remain fully functional during the check. ImportantAll data is processed in Germany.
In 89% of all cases, we discover serious security vulnerabilities. These are classified according to the CVSS (Common Vulnerability Scoring System). In principle, you will receive the evaluation by email in traffic light mode: red means „You must act!“, yellow means „There is a need for action“ and green means „Everything is OK“. If your score is 9, you will be notified specifically and repeatedly by e-mail. With a score of 10, we will call you!
Yes, our security checks can be customized for specific industries. Attacks are simulated depending on the industry, and precisely those that are particularly relevant to your company, e.g. in the metal construction or manufacturing industry.