What is Enginsight?

Enginsight is a robust cybersecurity platform developed in Germany, designed to integrate threat detection with protective strategies effectively.

Featuring automated security audits, penetration testing, IDS/IPS, micro-segmentation, vulnerability assessments, and risk analysis, this solution empowers businesses of all sizes to implement and oversee effective security measures through an intuitive dashboard.

It enables the automatic assessment of your systems, allowing you to quickly evaluate the security status of your IT assets. Completely built with a security-first approach, Enginsight functions without reliance on external tools.

It continuously scans your IT environment to identify devices, creating a real-time overview of your IT infrastructure.

With its automatic detection capabilities and an exhaustive inventory of IP network devices, which includes detailed categorization, Enginsight acts as a comprehensive surveillance and security barrier for your Windows and Linux servers, as well as endpoint devices like PCs.

Embark on your 15-day free trial today and take a step towards enhancing your organization's cybersecurity.

Pricing

Price Starts At:
$12.99 per month
Free Trial Offered?:
Yes

Integrations

Offers API?:
Yes, Enginsight provides an API
No integrations listed.

Screenshots and Video

Company Facts

Company Name:
Enginsight
Date Founded:
2017
Company Location:
Germany
Company Website:
enginsight.com
Edit This Page

Product Details

Deployment
SaaS
Windows
Mac
Linux
On-Prem
Training Options
Documentation Hub
Online Training
Webinars
On-Site Training
Support
Standard Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English
German

Enginsight Categories and Features

Website Monitoring Software

Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting

SIEM Software

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Network Monitoring Software

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting

Log Management Software

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

IT Management Software

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Endpoint Detection and Response (EDR) Software

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management