Home Powered by ECSO

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Vision & mission
    • Powered by ECSO
  • Matrix™
  • Register

User account menu

  • Log in
Home Powered by ECSO

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Vision & mission
    • Powered by ECSO
  • Matrix™
  • Register

User account menu

  • Log in
Home

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Vision & mission
    • Powered by ECSO
  • Matrix™
  • Register

User account menu

  • Log in

Breadcrumb

  1. Home
  2. Solutions

go.lywand.com

by Tom Haak from Lywand Software GmbH
(0 reviews)
Visit our website Contact us
Taxonomy:
  • Identify
    • Asset Mangement
      • Vulnerability Management (Analysis)

Description

Automated Security Checks

Perform regular security checks for your customers at freely selectable intervals – enabling continuous analysis of the IT infrastructure for potential vulnerabilities.

Three types of automated checks are available:

  • External Check for domains, IPs, and email addresses
  • Agent Check for Windows servers and clients
  • Network Check for the entire internal infrastructure such as printers, smartphones, Linux, and Mac devices
     

Clear Rating & Key Insights

After completing a security audit, the IT infrastructure receives a rating, and the current security status is presented in a clear and structured way.

The progression of these ratings makes developments and improvements easy to track. Systems, products, and key categories that are particularly at risk are highlighted – providing a holistic understanding at a glance.

Practical filtering options also allow for a separate evaluation of your Managed Services – making the value of your services more visible and creating easier opportunities for upselling.


Automatic Remediation of Vulnerabilities

With Auto Healing, up to 80% of detected vulnerabilities can be automatically fixed after an Agent Check – entirely without manual effort.

You can define individually for which devices and under which conditions Auto Healing should be active, for example only on specific device types or only for minor updates. The execution time can also be flexibly scheduled.

Supported applications include Microsoft Windows Suite, Java, Firefox, and Foxit PDF Reader.

 

Effective Measures for Remaining Risks

Based on the audit results, lywand provides recommendations for improving security – including clear descriptions and step-by-step implementation guides.

These measures are prioritized across all customers, allowing you to immediately see which actions have the greatest impact on overall security.

At the individual customer level, the recommendations are tailored specifically and can be strategically integrated into the Renovation Plan.

 

Concise Report & House Analogy

To help you present results to your customers in a clear and convincing way, lywand offers two formats:

  • Management Report – summarizes all relevant information in a concise and understandable manner for decision-makers.
  • House Analogy – designed for customers who are less technically experienced. It visualizes IT security in simple terms – for example, an open front door may represent an insecure password, while a crumbling façade symbolizes misconfigurations. This way, customers can instantly see where action is needed.

Solution properties

  • Cloud, SaaS, web-based
  • Market independent/agnostic (Means the solution overlaps all markets, and is linked to all)
  • The vendor did not specify this data field

Summary on Pricing plans

  • Pay as you go

Vendor overview

Lywand Software GmbH

  • Partner(s)

Contact details

  • Founded in 2020
  • Josefstr. 46a Top 6 3100 St. Poelten
  • Austria
Visit the website Visit our website

Solution details

  • Small business
    Mid-size business
  • English
  • German
  • Italian
  • The vendor did not specify this data field

Support services offered by the vendor ensuring the right implementation and functioning of the solution

Email/Help Desk
Knowledge Base
Phone Support
FAQs/Forum

Training services offered by the vendor enabling the end-user to use the solution

Live Online
Documentation
Videos
In Person
Webinars

Ratings & reviews

This solution has not been reviewed yet.

Do you want to leave a rating?

Login or register to proceed

Login Register

Follow us


Footer menu

  • Contact
  • Data Privacy Policy
  • FAQ

Manage your cookie preferences 


 

European Cyber Security Organisation, asbl

Avenue des Arts 46, Brussels, 1000, Belgium | VAT: BE0656734936 - REG 656734936  
Copyright © 2024 Cyberhive ®: Discover solutions from Europe™ | Powered by ECSO, developed by Trust-IT Services srl