Features
All features of the Enginsight solution at a glance. Enginsight is available as a standalone on-premises instance, SaaS Pro - Security and Monitoring unlimited or SaaS Small Business.
Last updated
All features of the Enginsight solution at a glance. Enginsight is available as a standalone on-premises instance, SaaS Pro - Security and Monitoring unlimited or SaaS Small Business.
Last updated
Pricing | SaaS SB | SaaS Pro | On-Pre, |
---|---|---|---|
Usage and quota | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Function | SaaS SB | SaaS Pro | On-Prem |
---|---|---|---|
Server license per month
from 9,90€
from 29,99€
on demand
Client license per month
from 2,80€
from 4,99€
on demand
Website/Webapp license per month
from 9,90€
from 9,99€
on demand
Penetration test license per month and customer
from 139,64€
from 139,64€
on demand
Addon G DATA EDR per month and server/client
from 1,66€
from 1,66€
on demand
Number of installable server agents
1
500
Number of installable client agents
10
500
Number of manageable web pages
2
500
Cross Platform Compatibility
(Windows, Linux, MacOS)
PDF-Reports
Switch alerts to deviations and safety events
Alert notification via email, SMS, Slack, Mattermost, Microsoft Teams
Group assets with tags
Unlimited number of team members
Role concept incl. user-defined roles
Logging of user activities
Subordinate clients
Single Sign On (SSO)
Log Collection - IT-Assets, Applications and Cloud
Log Analyse und Event Correlation
Log Forensics
Log Retention
Daten Normalisierung
SIEM Workflows
Hersteller Vorlagen
Managed Event-Streams
Individual Extractors
CVE Dashboard (Cockpit)
BSI warning about found CVEs
CVE Database
CVE recommendations for countermeasures
CVE Whitebox Scan and Monitoring
CVE Greybox Network Scan
CVE Blackbox Network Scan
CVE Website Scan and Monitoring
CVE alerting by criticality
Manage and automate updates
Configuration Management
Host based attack detection (IDS) detection
Host based blocking of attacks (IPS) response
Logging of all attacks and classification by severity
Live visualization of attacks
Definition of detection levels according to protection needs
Definition of blocking levels according to protection needs
Define whitelists
Software defined groupings of IT assets
Management of East-West data traffic according to the Zero Trust principle
Isolation of devices and device groups
Implementation of use case-specific IT security guidelines
Monitoring access to files and directories
Logging of all accesses
Alerting after unauthorized access
Provision of managed rules
Definition of individual sets of rules
Network segment scan
Scan of single IP-addresses
Scan of Websites
Information Gathering (Footprinting of the target systems)
CVE-Scan Blackbox / Greybox
Service Bruteforce (Check for insecure credentials)
Service Discovery (Specific checks of services for misconfigurations)
Clear evaluation of audits
Automated recurring scans
Send PDF-reports by e-mail
Store own password list
Extend vectors with custom scripts
Define asset inventory, IP addresses or endpoints as target systems
SSL/TLS-Monitoring
TLS validation according to BSI TR-03116-4
DNS-Monitoring
HTTP-Header Security Check
Port-Monitoring
Footprinting of the application environment
Availability monitoring: CPU, RAM, SWAP, network, hard disks
Monitoring of any data
Monitor metrics with machine learning
Monitor installed software
Monitor Autostarts
Monitor services
Monitor ports
Monitor processes
System log monitoring
Ping-Monitoring
Port-Monitoring
SNMP-Monitoring
Upload own MIBs
Permanent monitoring of the network according to its participants
Complete network inventory
Interactive asset map
Agent based inventory
Add your own scripts as plugins
Autonomous response to system events