Our free webinar on network security will take place on 17.06.2025 at 16:00. Find out more now.

+ 0 Security scans
make the DEFENDERBOX trustworthy.

DEFENDERBOX for the metal industry

One plug & play appliance or virtual machine, three powerful security modules — for an all-round cyber-secure IT infrastructure!

A lack of awareness does not protect against harm.

Additional tests every 2–3 months

A lack of awareness does not protect against harm.

Darknet research

A lack of awareness does not protect against harm.

External & internal pentesting

A lack of awareness does not protect against harm.

External vulnerability analysis

DEFENDERBOX Overview-d

Protect your company!

The DEFENDERBOX regularly checks production IT, office IT and connected systems such as machine controls or IoT components for vulnerabilities — even in hybrid environments. The solution identifies risks in outdated software, network access or configuration errors and provides clearly prioritized recommendations for action to safeguard against them.

At a glance

SIMPLE. FAST. CYBER SECURE.

Especially for your metal company

DEFENDERBOX security check

Monitoring network activities

Regular monitoring of network traffic enables early detection of anomalies and facilitates the investigation of security incidents.

DEFENDERBOX security check

Compliance Conformity

DEFENDERBOX supports compliance with TSAX/ISO27001 with documentation of proactive cyber security audits.

Protect your IT company

Secure Operational Technology (OT)

Regular security checks monitor the increasing connection of production facilities to IT networks.

as with 

IT security for your metal company
IT security for your metal company
IT security for your metal company

You can still expect that:

AI is behind hacker attacks. With DEFENDERBOX AI against AI.

DARKNET-
RESEARCH

Targeted checks on the Darknet for company data, compromised email addresses and passwords.

Weekly scans with recommended action.

WEEKLY REPORTING

The weekly DEFENDERBOX evaluations are tailored to the requirements of the management and the IT department: once short & crisp — once detailed & specific!

Weekly scans with recommended action.

HANDLING
RECOMMENDATIONS

The DEFENDERBOX report contains precise recommendations on how to close the security gaps.

DEFENDERBOX IT security

SMART PRIORITIZATION

The security gaps found are prioritized precisely. This means you know which gaps need to be closed first.

DEFENDERBOX NIS-2 compliant

COMPLIANCE REQUIREMENTS

DEFENDERBOX reporting is part of the statutory audits for NIS‑2, DORA or ISO27001.

DEFENDERBOX Managed Security Service

MANAGED SECURITY SERVICE

On-premise, multi-cloud, hybrid IT — the DEFENDERBOX moves seamlessly between environments.

Our range of functions

EXTERNAL VULNERABILITY ANALYSIS

DEFENDERBOX’s external vulnerability analysis systematically checks your IT infrastructure for security gaps and inefficient processes in order to identify risks at an early stage.

EXTERNAL
PENTESTING

DEFENDERBOX’s automated external pentest efficiently checks your external IT infrastructure for security gaps, assesses risks and continuously monitors security.

INTERNES
PENTESTING

DEFENDERBOX’s automated internal pentest efficiently checks your company network for security vulnerabilities, reduces costs and delivers reproducible test results.

DARKNET
RESEARCH

DEFENDERBOX’s darknet research specifically investigates activities on the darknet, uses specialized tools such as Tor and checks email addresses for data leaks.

other industries rely on us:

IT security for your car dealership

Car dealerships

Security for your industrial company

Industry

Many companies believe they are safe

OTHER
SECTORS

Vulnerability analysis, internal & external pentests — for the cyber security of the entire IT infrastructure — including alerts in the event of serious new security vulnerabilities.

Everything at a glance

This keeps your IT secure at all times — without any additional effort!

The DEFENDERBOX is a simple plug-and-play solution for IT security. As a Managed Security Service it checks your systems automatically and continuously — both from the outside and from the inside.

1.

Plug in

2.

Scan

3.

Results

DEFENDERBOX Overview

Prices

Base
Test installation

490€

one-time

Professional Subscription

495€

monthly with 100 IP’s

Professional One-time test

2.490€

plus one-time 249€ setup fee

Frequently asked questions:

A penetration test, or pentest for short, is a comprehensive security check for IT systems, networks or applications. We simulate real cyber attacks to uncover vulnerabilities and security gaps before they can be exploited by real hackers.

In contrast to simple vulnerability analyses, our pentests or security scans go one step further: they actively exploit potential security vulnerabilities to test the system’s resilience. This enables a realistic assessment of the security situation and uncovers vulnerabilities that may remain undetected with other methods.

An initial pentest or security scan uncovers the most urgent security gaps. As the computer landscape continues to grow, even in small companies, the risk potential is also changing. Especially when servers and other security-relevant systems are connected to the Internet. For this reason, a weekly or at least monthly pentest is an essential part of a proactive security strategy.

No, our experts do not need to be on site. You can do the simple installation of the DEFENDERBOX without us and the security scans are carried out completely remotely. However, we will be happy to support you on site on request — this is possible for an additional charge.

en_USEN
Cookie Consent with Real Cookie Banner