We use cookies to give you the best experience on our website. You can choose which cookies you want to allow below. You can find more details in our privacy policy.
Purpose | So that the user's cookie preferences can be taken into account, these are stored in the cookies. |
Data | Accepted or rejected cookie categories |
Originator | Lywand Software GmbH |
Privacy Policy |
Purpose | This web analytics tool allows us to compile user statistics about your website activity and to best tailor our website to your interests. |
Data | anonymized IP address, pseudonymized user identification, date and time of the request, amount of data transferred incl. message as to whether the request was successful, browser used, operating system used, website from which access was made. |
Originator | Google Ireland Limited |
Privacy Policy |
Purpose | Representation of the company's location using Google's map service. |
Data | Date and time of visit, location information, IP address, URL, usage data, search terms, geographic location. |
Originator | Google Ireland Limited |
Privacy Policy |
Purpose | Convenient appointment scheduling via Calendly directly on the website. |
Data | Appointment information, calendar information, information from third-party software providers, payment information, chatbot data, marketing information, log & device data, cookie data, usage data |
Originator | Calendly LLC |
Privacy Policy |
Purpose | This data processing is performed by YouTube to ensure the functionality of the player. |
Data | Device information, IP address, referrer URL, viewed videos |
Originator | Google Ireland Limited |
Privacy Policy |
Developed by IT security experts for MSSPs, IT service providers and system houses.
Perform regular security checks for your customers at freely selectable intervals – enabling continuous analysis of the IT infrastructure for potential vulnerabilities.
Three types of automated checks are available:
External Check for domains, IPs, and email addresses
Agent Check for Windows servers and clients
Network Check for the entire internal infrastructure such as printers, smartphones, Linux, and Mac devices
After completing a security audit, the IT infrastructure receives a rating, and the current security status is presented in a clear and structured way.
The progression of these ratings makes developments and improvements easy to track. Systems, products, and key categories that are particularly at risk are highlighted – providing a holistic understanding at a glance.
Practical filtering options also allow for a separate evaluation of your Managed Services – making the value of your services more visible and creating easier opportunities for upselling.
With Auto Healing, up to 80% of detected vulnerabilities can be automatically fixed after an Agent Check – entirely without manual effort.
You can define individually for which devices and under which conditions Auto Healing should be active, for example only on specific device types or only for minor updates. The execution time can also be flexibly scheduled.
Supported applications include Microsoft Windows Suite, Java, Firefox, and Foxit PDF Reader.
Based on the audit results, lywand provides recommendations for improving security – including clear descriptions and step-by-step implementation guides.
These measures are prioritized across all customers, allowing you to immediately see which actions have the greatest impact on overall security.
At the individual customer level, the recommendations are tailored specifically and can be strategically integrated into the Renovation Plan.
To help you present results to your customers in a clear and convincing way, lywand offers two formats:
Management Report – summarizes all relevant information in a concise and understandable manner for decision-makers.
House Analogy – designed for customers who are less technically experienced. It visualizes IT security in simple terms – for example, an open front door may represent an insecure password, while a crumbling façade symbolizes misconfigurations. This way, customers can instantly see where action is needed.
With integrations to Autotask PSA, TANSS and c-entron, you can keep track of all measures. Synchronization ensures that tickets are created and seamlessly monitored.
Our open API allows you to seamlessly integrate lywand into your processes – whether for ticketing systems, communication platforms, or other applications.
Design the platform in your company’s own look and feel. With Whitelabeling, you can customize the color scheme, logo, system emails, and login URL to match your brand.
With read-only access, you can provide your customers with secure insight into their IT security status – without allowing any changes to be made.
To better support you in your service offering, we have a consumption billing model that charges for actual consumption based on checked targets.
You can audit your clients' internal and external IT infrastructure flexibly and without commitment.
The Consumption model is end-customer independent and is based on the checked targets.
Externally, a monthly scan and a complementary scan per target are included. Additional scans can be added at any time.
Internally, the targets are scanned daily as long as the agent is installed
The reseller purchase price per target is calculated according to the type of scan target, as well as the largest used monthly scan volume in the respective partner level.
The distributor settles the invoice at the end of the month.