Your current security situation is assessed based on a scale from F (very insecure) to A (very secure). In addition, the potential demonstrates the extent to which the planned measures can improve your security.
We use cookies to give you the best experience on our website. You can choose which cookies you want to allow below. You can find more details in our privacy policy.
Purpose | So that the user's cookie preferences can be taken into account, these are stored in the cookies. |
Data | Accepted or rejected cookie categories |
Originator | Lywand Software GmbH |
Privacy Policy |
Purpose | This web analytics tool allows us to compile user statistics about your website activity and to best tailor our website to your interests. |
Data | anonymized IP address, pseudonymized user identification, date and time of the request, amount of data transferred incl. message as to whether the request was successful, browser used, operating system used, website from which access was made. |
Originator | Google Ireland Limited |
Privacy Policy |
Purpose | Representation of the company's location using Google's map service. |
Data | Date and time of visit, location information, IP address, URL, usage data, search terms, geographic location. |
Originator | Google Ireland Limited |
Privacy Policy |
Purpose | Convenient appointment scheduling via Calendly directly on the website. |
Data | Appointment information, calendar information, information from third-party software providers, payment information, chatbot data, marketing information, log & device data, cookie data, usage data |
Originator | Calendly LLC |
Privacy Policy |
Purpose | This data processing is performed by YouTube to ensure the functionality of the player. |
Data | Device information, IP address, referrer URL, viewed videos |
Originator | Google Ireland Limited |
Privacy Policy |
Developed by IT security experts for MSSPs, IT service providers and system houses.
The Partner Dashboard provides information on the current phase or partner level and shows how far away the next level is. It also contains comprehensive information on targets and vulnerabilities. In addition, the Partner Dashboard provides an overview of all relevant customer information and the possibility to create new customers.
The external infrastructure (consisting of domains, subdomains, IP addresses and email addresses) can be checked automatically at regular intervals. Additional checks can be triggered at any time with a mouse click. All you need to do is enter the domain - all associated targets are automatically identified.
Checks of the internal infrastructure are carried out continuously and provide daily results. All you need to do is install agents once on the end devices (laptops, computers and servers).
After completion of an assessment, your client receives a current security rating in the academic grading system from A to F.
A subdivision into categories provides information about the areas in which there is the greatest need for improvement.
The Security Dashboard also shows the progress of the assessment. The potential indicates which rating can be achieved with the planned measures.
In the "Check Insights" tab, there are detailed results for each scanned target, such as applied check methods, attack surface, risk assessment and open ports.
In addition, for the external infrastructure, you will receive information on missing patches, software used, and online/offline status.
For the internal targets, information about activated local users, outdated programmes, running processes, firewall and antivirus is provided.
The CIS Benchmarks are used to preventively protect your customers' IT infrastructure. The extent to which these are fulfilled and detailed descriptions can be found in the Best Practices.
A report provides you with sound evidence and support for certification processes.
Lywand automatically suggests measures for improving security based on the vulnerabilities found.
For each measure, there is a simple description and, when expanded, a detailed explanation of the technical implementation.
All the measures you have previously selected are displayed in the renovation plan. Using Quick Planning, the most effective measures can be planned with only one mouse click.
The renovation plan serves as a to-do list for your employees and completed measures can be ticked off. After completing the next security check, lywand indicates if the measures actually work and the vulnerabilities have been remedied.
With Auto Healing, vulnerabilities in the internal infrastructure can be fixed automatically. Supported applications are Microsoft Windows Suite, Java, Firefox and Foxit PDF Reader.
The automatic updates significantly reduce the number of outstanding measures and at the same time minimizes your workload.
Through the connection to Datto's ticketing system Autotask PSA, it is possible to manage and process measures directly and efficiently in Autotask.
All measures are synchronised with Autotask and tickets are created accordingly.
If a security audit determines that a measure was effective and the vulnerability could be remedied, the corresponding ticket is automatically marked as solved.
The Management Report provides you with a summary of the security audit in simple language. In addition to the audit scope with the most important facts, the progress is also displayed.
You can integrate your own logo into the Security Audit Platform. This makes it possible to label Management Reports with your own brand.
To simplify the communication with your customers, we have developed our own analogy. Using a house as an example, you can explain in simple terms how the security situation currently is.
For example, if there are problems with the encryption of messages and data, you can explain it using the windows of a house. Every single open window makes it easier for a thief to enter the house.
Customize the look and feel of our Security Audit Platform with Whitelabeling. You can make various customizations, including changing the color scheme, adding your logo, enabling neutral system emails, and using a unique login URL.
To better support you in your service offering, we have a consumption billing model that charges for actual consumption based on checked targets.
You can audit your clients' internal and external IT infrastructure flexibly and without commitment.
The Consumption model is end-customer independent and is based on the checked targets.
Externally, a monthly scan and a complementary scan per target are included. Additional scans can be added at any time.
Internally, the targets are scanned daily as long as the agent is installed
The reseller purchase price per target is calculated according to the type of scan target, as well as the largest used monthly scan volume in the respective partner level.
The distributor settles the invoice at the end of the month.
IT security vulnerabilities are less likely to be noticed by SMEs, because security audits require a lot of know-how, time and expertise. To provide small and medium-sized enterprises an access to cybersecurity, we offer cost-effective, fully automated and continuous security checks.
We work with a network of partners consisting of IT resellers, IT service providers and system houses who are delighted to offer you our product and thus help to improve your IT security.
KMU.Cybersecurity - AWS Förderung
As of April 1, 2022, Austria Wirtschaftsservice Gesellschaft mbH offers a funding of up to € 20,000 for Austrian SMEs.
The subsidy covers expenses in the field of IT and cybersecurity as well as other costs such as licences for IT security solutions.
Based on the security situation of your IT infrastructure, lywand generates a tailor-made recommendation of measures for the improvement of your cybersecurity.
You receive support and advice from your IT service provider, who takes over planning and implementation of appropriate measures.
While common measures and products are made for large companies and thus too expensive and complex for SMEs, lywand is affordable for everyone.
The assessment and recommendations are presented in an illustrative and understandable way. Therefore, technical expertise is not necessary.
With the help of continuous checks, you always have certainty and visibility of your cybersecurity situation. Moreover, you will be automatically notified if your security rating deteriorates.
Blind trust in a cybersecurity product is no longer necessary. Your security situation becomes tangible, and you see how well your company is protected.
Your current security situation is assessed based on a scale from F (very insecure) to A (very secure). In addition, the potential demonstrates the extent to which the planned measures can improve your security.
In the security dashboard the different categories used for the assessment are explained in a comprehensible way. Furthermore, there is also a separate assessment and display of the potential for each category.
Using an illustration of a house your current security situation is visualized. A missing front door and open windows etc. represent the points of attack within your IT infrastructure.
You will receive a monthly management report with a summary of the security audit in a simple language for non-technicians. In Addition to the scope of the inspection with the most important facts, the progress is also displayed.