Regular Security Checks – Easier Than Ever

Lywand takes care of ongoing security assessments for you – automatically and reliably. This lets you stay on top of risks, measurably improve your customers’ security, and increase the quality of your services.

Three Checks That Give MSPs Full Transparency

External Check

Shows at a glance how vulnerable the publicly accessible infrastructure is. Domains, IPs, and email addresses are analyzed to detect vulnerabilities and compromised accounts early.

Agent Check

Examines all Windows clients and servers in detail: vulnerabilities, configurations, patch levels. Plus automatic asset discovery for complete network transparency.

Network Check

Analyzes all devices in the internal network via a gateway. You quickly see where vulnerabilities and configuration issues are hidden – or where essential system hardening is missing.

#1 External Check

The External Check provides a fast and straightforward entry into security analysis. It reveals how vulnerable a company’s externally reachable infrastructure is – exactly where potential attackers would probe first. This includes checking domains and subdomains, public IP addresses, and email addresses.

Lywand performs a comprehensive security assessment from an attacker’s perspective and identifies:

  • Common Vulnerabilities and Exposures

  • Configuration and encryption standards

  • Web security according to OWASP Top 10

  • Compromised email addresses from password leaks

#2 Agent Check

In addition to the external security posture, it’s important to keep internal IT infrastructure in view. For this, lywand uses its own agent – software installed on compatible Windows clients and servers.

The agent thoroughly analyzes each system and checks:

  • Common Vulnerabilities and Exposures

  • Misconfigurations

  • Current patch levels

  • Implementation of basic security mechanisms
    (e.g., firewall enabled, antivirus present, handling of Office macros)

Asset Discovery Detects Shadow IT

Alongside the security analysis, the agent automatically performs asset discovery.

It detects and inventories all devices reachable in the network – from laptops and servers to smartphones, printers, and other network devices.

This creates full transparency across the existing IT infrastructure, making forgotten or unknown devices visible.

#3 Network Check

Last but not least, the Network Check allows you to assess the entire internal network for vulnerabilities – from printers and smartphones to Linux and macOS systems. The security assessment is carried out via a dedicated gateway deployed as a virtual machine inside the network.

This check uses several methods to assess security:

  • Common Vulnerabilities and Exposures

  • Configuration and encryption

  • System hardening

Notifications
Regular Checks
Manual Checks

Always Stay Informed

If the rating worsens after a security audit, you will automatically be notified by email.

This allows you to respond immediately before small issues turn into major risks.

Automated & Plannable

IT security is dynamic. With lywand, you can schedule automated, recurring assessments.

Define frequency, weekday, and time – lywand handles the rest.

Targeted Control at the Push of a Button

You can start a security assessment at any time – for the entire scope or specific systems.

This is especially useful for checking whether vulnerabilities have actually been fixed after implementing measures.

Curious?

In a short video, you can get to know the most important features at once.

Or would you like to learn more? We’d be glad to give you a closer look at the platform in a personal meeting.