Used by companies that care about their IT security
With the On-Premises Security and Monitoring solution from Enginsight you bring the necessary security into your IT. You will be amazed how fast and easy the On-Premises installation works. In just a few minutes we roll out the entire system to you via docker containers.
Used by companies that care about their IT security
On-Premises is especially popular with our larger customers. With our Security by Design approach you get a highly secure software solution that you can install with full data control within your own IT or data center.
Enginsight is as flexible as its customers. In addition to the SaaS model, we offer two other billing models in the on-premises area.
Rental model (perpetual)
You can rent the entire Enginsight platform annually. Maintenance and update costs are already included in the rent.
Purchasing model
Buy Enginsight once and then pay only the annual maintenance fees according to your term contract.
Easily secure your entire enterprise. From the applications to the servers and clients to the networked production facility. Detect attacks in real time and automate defenses.
Enginsight NexT™ monitors your servers completely autonomously. It is no longer necessary to define monitoring rules manually. Relieve your administrators while at the same time increasing the quality of the alarms.
Inventory of all servers, clients, devices, and applications. Visualization of assets including their dependencies in environment maps. Automation of maintenance work and solutions to emerging problems.
Enginsght is based on a microservice architecture. This allows the platform to be operated with maximum flexibility and scales with your requirements.
Enginsight is developed by embedded programming. So you can already start with a Dual Core processor and 4 GB Ram.
Especially our agent stands out due to his platform independence. It runs on Windows or Linux, no matter if x86 or ARM.
Hacktor
Automate the penetration testing in your company. Hacktor shows you the view of a hacker on your company. Possible targets are network segments, IP addresses or websites.
Watchdog
The Watchdog inventories your network segments (Asset Discovery). At the same time, it classifies the found assets and offers ping and port checks or monitoring via SNMP, depending on the type of asset.
Pulsar Agent
It finds vulnerabilities and configuration deficiencies, analyses network traffic and event logs. It fixes problems found, patches your system and reacts automatically to network attacks.
Observer
Monitor web pages, web applications or IP addresses. Perform security analyses and monitor availability from any location.
Automated penetration test (Intelligence Gathering, Spoofing,
Bruteforce, Discovery, DDoS)
Network CVE-Scan
invasive(!)
Inventory
Health-Checks (Ping, Port)
SNMP-Monitoring
non-invasive (intern)
Events | DPI | CVE-Scan | Configuration deficiencies | Uptime
Monitoring | Process Monitoring | Software Inventory | AI Anomaly Detection
non-invasive (intern)
Website CVE-Scan | Uptime Monitor | SSL/TLS Check | Portscan | HTTP-Header Analysis | Vulnerability Test
non-invasive (extern)
You want to use Enginsight as On-Premises (self hosting)? I am happy to answer all your questions and look forward to helping you with your IT security.