ENGINSIGHT
WebsiteLoginKostenloser Testzugang
English
English
  • Overview
  • Features
  • Operation
    • Platform overview
    • Start Guide
    • Platform
      • Dashboard
        • Vulnerability Management
        • Operation Centers
        • My Dashboards
        • Configurations
      • Issues
      • Hosts (Pulsar Agent)
        • Pulsar Agent
        • Host details
        • Policy Manager
        • Software Inventory
        • Intrusion Detection System
        • File Integrity Monitoring
        • System events
        • Update Manager
        • Plugins
        • Machine Learning
      • Host (Pulsar-Agent) BETA
        • Pulsar Agent
        • Hostdetails
        • Softwareinventar
        • Plugins
        • Policies
        • Globale Tags
        • Tag Manager
        • System Events
        • Vulnerability Manager
        • Compliance
        • Intrusion Detection System
        • File Integrity Monitoring
        • Advanced Persistent Threats
      • Endpoints (Observer)
        • Endpoint details
        • Domains
        • Certificate Manager
        • Observer
      • Observations
      • Shield
      • Penetration Testing (Hacktor)
        • Run pentest
        • Audits
        • Audit Definitions
        • Target Groups
        • Auth-Providers
        • Hacktor
        • Custom Scripts
      • Discoveries
      • SIEM
        • Data Lake
        • Cockpits
        • Obfuscators
        • Workflows
        • Incidents
        • Extractors
        • Collectors
        • Loggernaut
        • Advanced Settings
        • Models
      • Alerts
      • Settings
      • Organisations
      • Tags
      • Searchbar
  • On-Premises
    • Requirements
    • Installation
      • Automatic Installation
      • Manual Installation
      • Load Balancing
      • SIEM
      • Deinstallation
    • Update
    • Configuration
      • HTTPS and Certificates
      • Licences and Organisations
      • Mail Server
      • 2-Factor Authentication
      • SSO via Office 365
      • Storage Times
      • White Label
      • NGINX Extractor
      • Field Level Encryption
      • Loggernaut-Configurations
  • Technical Details
    • System Requirements
      • Pulsar: Operating Systems
    • Current version numbers
    • Pentest Vectors
    • API
  • Partner section
    • Licenses and organizations
Powered by GitBook
On this page
  • Prices and usage options at a glance
  • Platform functions
  • SIEM - Security Information and Event Management
  • Vulnerability Management
  • Intrusion Detection und Prevention (IDS/IPS)
  • Microsegmentation
  • File Integrity Monitoring
  • Automated penetration testing
  • Website monitoring
  • IT monitoring (with agent)
  • IT monitoring (without agent)
  • IT inventory
  • Automation

Was this helpful?

Features

All features of the Enginsight solution at a glance. Enginsight is available as a standalone on-premises instance, SaaS Pro - Security and Monitoring unlimited or SaaS Small Business.

Prices and usage options at a glance

Pricing
SaaS SB
SaaS Pro
On-Pre,

Server license per month

from 9,90€

from 29,99€

on demand

Client license per month

from 2,80€

from 4,99€

on demand

Website/Webapp license per month

from 9,90€

from 9,99€

on demand

Penetration test license per month and customer

from 139,64€

from 139,64€

on demand

Addon G DATA EDR per month and server/client

from 1,66€

from 1,66€

on demand

Usage and quota
SaaS SB
SaaS Pro
On-Prem

1

500

Number of installable client agents

10

500

2

500

Platform functions

Function
SaaS SB
SaaS Pro
On-Prem

(Windows, Linux, MacOS)

PDF-Reports

Subordinate clients

SIEM - Security Information and Event Management

Function
SaaS SB
SaaS Pro
On-Prem

Log Forensics

Log Retention

Daten Normalisierung

Hersteller Vorlagen

Managed Event-Streams

Vulnerability Management

Function
SaaS SB
SaaS Pro
On-Prem

CVE Dashboard (Cockpit)

BSI warning about found CVEs

CVE Database

CVE recommendations for countermeasures

Intrusion Detection und Prevention (IDS/IPS)

Function
SaaS SB
SaaS Pro
On-Prem

Live visualization of attacks

Define whitelists

Microsegmentation

Function
SaaS SB
SaaS Pro
On-Prem

File Integrity Monitoring

Function
SaaS SB
SaaS Pro
On-Prem

Alerting after unauthorized access

Automated penetration testing

Function
SaaS SB
SaaS Pro
On-Prem

Website monitoring

Function
SaaS SB
SaaS Pro
On-Prem

IT monitoring (with agent)

Function
SaaS SB
SaaS Pro
On-Prem

IT monitoring (without agent)

Function
SaaS SB
SaaS Pro
On-Prem

IT inventory

Function
SaaS SB
SaaS Pro
On-Prem

Automation

Function
SaaS SB
SaaS Pro
On-Prem
PreviousOverviewNextPlatform overview

Last updated 1 year ago

Was this helpful?

Number of installable server

Number of manageable

Cross Platform

Switch to deviations and safety events

via email, SMS, Slack, Mattermost, Microsoft Teams

Group assets with

Unlimited number of

incl. user-defined roles

Logging of

(SSO)

- IT-Assets, Applications and Cloud

Log Analyse und

SIEM

Individual

CVE and Monitoring

CVE Network Scan

CVE Network Scan

CVE Scan and Monitoring

CVE by criticality

Manage and automate

Management

Host based (IDS) detection

Host based (IPS) response

Logging of all attacks and by severity

Definition of according to protection needs

Definition of according to protection needs

Software defined

of East-West data traffic according to the Zero Trust principle

of devices and device groups

of use case-specific IT security guidelines

Monitoring

of all accesses

Provision of

Definition of individual sets of

scan

Scan of single

Scan of

(Footprinting of the target systems)

CVE-Scan

Service (Check for insecure credentials)

(Specific checks of services for misconfigurations)

Clear evaluation of

recurring scans

Send by e-mail

Store own

Extend vectors with

Define , IP addresses or endpoints as target systems

-Monitoring

according to BSI

-Monitoring

Security Check

-Monitoring

of the application environment

: CPU, RAM, SWAP, network, hard disks

Monitoring of

Monitor metrics with

Monitor

Monitor

Monitor

Monitor

Monitor

monitoring

-Monitoring

-Monitoring

-Monitoring

Upload

Permanent according to its participants

Complete

Interactive

Agent based

Add your own scripts as

to system events

agents
web pages
Dashboards
alerts
tags
API
Multi-client capability
White Label
Own mail server
Single Sign On
Log Collection
Event Correlation
Dashboards
Workflows
Cloud Connectors
Extractors
Obfuscators
Greybox
Blackbox
alerting
Software inventory
Penetrationtesting
attack detection
blocking of attacks
Network segment
IP-addresses
Websites
Blackbox / Greybox
audits
Automated
PDF-reports
password list
custom scripts
asset inventory
Software inventory
plugins
TR-03116-4
Compatibility
Asset Operation Center
user activities
Alert notification
team members
Role concept
Ping
Port
SNMP
own MIBs
Website
Availability and response times
SSL/TLS
TLS validation
Certificate Manager
DNS
HTTP-Header
Port
Footprinting
CVE-Scan
blocking levels
groupings of IT assets
Management
Isolation
Implementation
access to files and directories
Logging
managed rules
rules
Information Gathering
Bruteforce
Service Discovery
monitoring of the network
network inventory
asset map
Run scripts regularly
Autonomous response
License management
Whitebox Scan
updates
Configuration
classification
detection levels
Availability monitoring
any data
machine learning
installed software
Autostarts
services
ports
processes
System log
inventory