Take advantage of Enginsight within your own infrastructure and identify vulnerabilities and security breaches within your IT early on.

Everything the medium-sized companies need.

With the On-Premises Security and Monitoring solution from Enginsight you bring the necessary security into your IT.

You will be amazed how fast and easy the On-Premise installation works. In just a few minutes we roll out the entire system to you via docker containers.

Cyber attacks happen every second!
Protect your IT today with Enginsight.


Easily secure your entire enterprise. From the applications to the servers and clients to the networked production facility. Detect attacks in real time and automate defenses.


Enginsight NexT™ monitors your servers completely autonomously. It is no longer necessary to define monitoring rules manually. Relieve your administrators while at the same time increasing the quality of the alarms.


Inventory of all servers, clients, devices, and applications. Visualization of assets including their dependencies in environment maps. Automation of maintenance work and solutions to emerging problems.

Powerful and flexible thanks to state-of-the-art technologies

Enginsght is based on a microservice architecture. This allows the platform to be operated with maximum flexibility and scales with your requirements.

Enginsight is developed by embedded programming. So you can already start with a Dual Core processor and 4 GB Ram.

Especially our agent stands out due to his platform independence. It runs on Windows or Linux, no matter if x86 or ARM.


Automate the penetration testing in your company. Hacktor shows you the view of a hacker on your company. Possible targets are network segments, IP addresses or websites.


The Watchdog inventories your network segments (Asset Discovery). At the same time, it classifies the found assets and offers ping and port checks or monitoring via SNMP, depending on the type of asset.

Pulsar Agent

It finds vulnerabilities and configuration deficiencies, analyses network traffic and event logs. It fixes problems found, patches your system and reacts automatically to network attacks.


Monitor web pages, web applications or IP addresses. Perform security analyses and monitor availability from any location.


Automated penetration test (Intelligence Gathering, Spoofing,
Bruteforce, Discovery, DDoS)

Network CVE-Scan




Health-Checks (Ping, Port)


non-invasive (intern)

Pulsar Agent

Events | DPI | CVE-Scan | Configuration deficiencies | Uptime
Monitoring | Process Monitoring | Software Inventory | AI Anomaly Detection

non-invasive (intern)


Website CVE-Scan | Uptime Monitor | SSL/TLS Check | Portscan | HTTP-Header Analysis | Vulnerability Test

non-invasive (extern)

Hardware Appliances

Enginsight starts directly with all relevant security analyses. Our following software components are available to you for the various tasks. You can install them from the console within a few seconds.


Use our software components Watchdog, Hacktor or Observer, pre-installed on an industry-compliant appliance.
Network cables in and there you go.


With our pre-installed software components Watchdog, Hacktor or Observer you only need to connect the appliance to your network to start monitoring and security analysis.


A complete Enginsight On-Premises installation, pre-installed and ready for use in your data center. Operate your own Enginsight server "out-of-the-box" in your data center.

Keep an eye on your web pages, servers and clients at all times and protect yourself against cyber attacks.

Klicke den Bearbeitungs-Button um diesen Text zu verändern. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

jQuery(window).load(function() { jQuery.each( elementorFrontend.documentsManager.documents, ( id, document ) => { if ( document.getModal && id == 4611) { // It's a popup document document.getModal().on( 'show', () => { console.log( 'src="' ); } ); } }); });

Enginsight is a Telekom Techboost Company