Host security for servers and clients
Automatically obtain comprehensive security analyses for Windows and Linux servers and for your clients.
24/7 live monitoring of your systems, completely without configuration
Become proactive - operate IT hygiene
With Enginsight and our Pulsar-Agent you are directly on the system and create monitoring exactly where it is important.
The Pulsar Agent as well as the rest of the Enginsight security software is programmed in Golang (Google GO). This is a very hardware-near and extremely stable – who hasn’t had problems with Java 😉 – programming language and makes sure that there is hardly any load. This not only ensures ideal performance, but also saves hardware costs.
The use of outdated and insecure software on individual servers or clients endangers the security of the entire IT infrastructure. With Enginsight you get a tool to detect these vulnerabilities immediately.
For each vulnerability you get the CVE score and the ID of the vulnerability. Each CVE is linked to a source that provides in-depth vulnerability information, such as the National Vulnerability Database of the National Institute of Standards and Technology (NIST). Furthermore, for all operating systems that we support, the corresponding CVE databases are crawled and merged. The databases are updated hourly and always up-to-date.
To quickly close security gaps caused by outdated software, Enginsight offers you update management that opens up great potential for automation.
The Update Manager provides you with a list of pending updates on all your hosts. Here several updates can be installed together on several systems.
For Windows systems, the Update Manager can be used to install Windows-specific cumulative updates. If Windows Server Update Services (WSUS) is available, it is used.
On Linux systems, it is generally possible to apply all patches, even for Third-party software.
Next to insecure software, faulty configurations represent a second category of risk that you can effectively address with Enginsight’s configuration management. Use autofixes to correct configurations directly from the Enginsight platform.
Supplement the configuration guidelines according to your needs:
- Define your own guidelines
- Assign servers and clients via lists and tags
All analysis results are automatically collected and clearly displayed within the Enginsight Security Platform. This allows you to see at a glance where there is a concrete need for action. In addition, risk scoring tells you how urgent or critical an incident is.
For management reporting or to your customers, you can easily download all security analyses as PDF files. This not only gives you an automated reporting option, but also allows you to document your own actions and the resulting improvements.
Arrange a demo appointment today and we will show you how quickly you can get a grip on your company’s IT security.
Within 30 minutes you’ll learn how Enginsight can help you monitor all your IT, identify vulnerabilities and simulate hacker attacks. We show you how you too can increase the security status of your IT within the shortest possible time and what is really important in everyday life to relieve your IT staff and still be up-to-date.
FAQ - SHORT QUESTIONS, SHORT ANSWERS
Enginsight was developed according to the principle “Security by Design”. The IT architecture behind Enginsight has been tested many times and offers you the highest security as SaaS and on-premises. Please feel free to contact us for exact details on the IT architecture of the platform.
The entire platform is ready for use within minutes in both SaaS and on-premises versions. All analyses run automatically, so that you receive a well-founded security audit without configuration effort as well as constant live monitoring of your entire IT.
After the test phase, Enginsight can be used as a cloud solution for as little as 10 euros per year (Enginsight GO). All SaaS prices can be found here. For an on-premises calculation please contact our sales department. Here the prices are calculated individually according to your IT size.