Enginsight offers a comprehensive set of features for analyzing and securing your system landscape. This includes the perspective of a potential hacker on your systems as well as the detailed analysis of your servers, clients and IoT devices.
AI-supported procedures help us to detect attacks in real time and to classify them according to type and origin.
SECURITY ANALYSES OF WEBSITES
From the perspective of a potential attacker, Enginsight finds out what software is installed on the server and what attack scenarios result from it.
To this end, a comprehensive set of methods is used to automatically find out whether a vulnerable software is running and whether it has a deficient configuration that reveals information about the system.
This includes non-invasive scans such as the comparison with our CVE databases as well as invasive scans such as the OWASP Top 10.
SECURITY ANALYSES OF HOSTS
Enginsight Agent Pulsar finds vulnerabilities in the host’s operating system and installed software.
Furthermore, the hosts are examined with regard to safety-relevant configuration deficiencies. For example, whether there are weaknesses in user management, whether SSH is configured correctly or whether there are problems with the firewall configuration.
The agent not only tells you where there are problems but also supports you in solving them.
DEEP PACKET INSPECTION
If required, the Enginsight Agent analyzes network traffic for suspicious behavior and potential attacks. All anomalies found are classified and visualized according to the type and origin of the attack.
Examples include potential DDoS attacks, man-in-the-middle scenarios, and SSH brute force.
An AI-supported procedure also detects whether personal data leaves the host unencrypted.
More information: https://enginsight.com/en/features/cyber-security/