This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

Use #itsa19

6 - 8 October 2020 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2019




Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Enginsight offers a comprehensive set of features for analyzing and securing your system landscape. This includes the perspective of a potential hacker on your systems as well as the detailed analysis of your servers, clients and IoT devices.

AI-supported procedures help us to detect attacks in real time and to classify them according to type and origin.


From the perspective of a potential attacker, Enginsight finds out what software is installed on the server and what attack scenarios result from it.

To this end, a comprehensive set of methods is used to automatically find out whether a vulnerable software is running and whether it has a deficient configuration that reveals information about the system.

This includes non-invasive scans such as the comparison with our CVE databases as well as invasive scans such as the OWASP Top 10.


Enginsight Agent Pulsar finds vulnerabilities in the host’s operating system and installed software.

Furthermore, the hosts are examined with regard to safety-relevant configuration deficiencies. For example, whether there are weaknesses in user management, whether SSH is configured correctly or whether there are problems with the firewall configuration.

The agent not only tells you where there are problems but also supports you in solving them.


If required, the Enginsight Agent analyzes network traffic for suspicious behavior and potential attacks. All anomalies found are classified and visualized according to the type and origin of the attack.

Examples include potential DDoS attacks, man-in-the-middle scenarios, and SSH brute force.

An AI-supported procedure also detects whether personal data leaves the host unencrypted.

More information:

You decided to attend the it-sa? Get your tickets at the TicketShop


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.