Lexxton Cyber Risk Assessment CYRA

Recognize attack risk. Close vulnerabilities.

CYRA is an external vulnerability scan that scans and assesses a company’s outward-facing network infrastructure, systems and applications for potential vulnerabilities.

This simulates attacks on the network from the outside in order to find and close gaps or vulnerabilities that malicious hackers could exploit, such as open ports, unprotected assets or firewall vulnerabilities.

Where is your company vulnerable to cybercrime?

Cyber attack simulation

Lexxton CYRA automates the typical process of a cyber attack – i.e. the planning and preparation phase with targeted information gathering and reconnaissance.

Analysis of weak points

The automated asset discovery scans target the attack surface of assets, information and services.

Analysis of the attack surface

Document and analyze your company’s attack surface with the neutral view of CYRA, which enables you to anticipate the activities of cyber criminals.

Identification of business risks

The assessment provides important information about how and where your company is exposed and generates informative reports on your company’s risk potential.

Protection of the company

The scan alerts your team to the countermeasures required to keep your company secure.

Analyze your public attack surface with Lexxton CYRA

Scan of the public attack surface

Lexxton CYRA performs a passive reconnaissance and discovers your publicly accessible assets.

Findings of vulnerability

CYRA measures hundreds of parameters to analyze the company’s cyber security situation and documents where problems may occur.

Qualification of your team

Our platform creates a detailed risk report that summarizes the risk to your business and shows how your team can mitigate the risk.

Lexxton CYRA analyzed

  • Domain Security
  • Network Security
  • IP Security
  • AS Security
  • Web Security
  • Typosquatting

Automated continuous risk monitoring

Automatic assessment

The CYRA platform is automated and requires no manual intervention. We offer a range of license packages to suit your business needs.

The platform generates alerts and recommendations as new vulnerabilities are discovered and automatically updates the Digital Risk Score.

The updates provide the organization with complete visibility into its publicly accessible digital assets (websites, servers, networks, etc.) and enables remediation actions.

Evaluation using risk score

After analyzing each detected asset, an AI-supported algorithm calculates all the information and creates an overall assessment of the company’s cyber situation. This rating is expressed as a number from 0 (insecure) to 100 (most secure) and is divided into five categories, which are color-coded for quick identification.

A rating above 90 is considered very good, a rating below 70 means that measures need to be taken. A rating of less than 50 means that obvious weaknesses need to be rectified urgently.

Cyber Threat Intelligence (CTI)

Lexxton CYRA analyzes all digital paths of cybercrime. By analyzing threat data, patterns can be identified that can be used to implement security measures to protect against future attacks.

Data Leaks: Search and analysis of company e-mail addresses with proof of passwords used, password hashes and empty password records.

Darknet: Analysis of instances on the Darknet that affect the target and are distributed in closed environments such as criminal forums, chats, etc.

Botnet: Search and analyze devices infected with botnet malware, with evidence of the exfiltrated files available to the cybercriminals.

Services & Prices

Single scan CYRA Online Access
Feature Content «SINGLE» «SMALL» «MEDIUM» «LARGE» «ENTERPRISE»
CHF/EUR 990 CHF/EUR 3’900 CHF/EUR 5’900 CHF/EUR 8’900 on request
Update Number of CYRA scans 1x dynamic PDF report monthly 2-weekly weekly customized
Max monitored assets Number of recognized assets, i.e. IP addresses and/or domains including network. 500 100 200 500 5000
Number of companies Number of group companies incl. various domains × 1 1 1 10
Third party monitoring Supplier risk assessment and profile, including financial implications in the event of an attack × 1 3 10 30
Enduser Login Online access to the platform ×
Security Assessment Management Summary Summary overview after the risk assessment has been carried out or while it is still running (in real time)
Security assessment final rating of the total assets discovered and based on the results from 0 to 100, where 0 is poor and 100 is excellent
Vulnerability monitoring List and details of known vulnerabilities and misconfigurations in detected objects
Report creation Creation of dynamic reports in various languages (EN, DE, FR, IT, ES) one-time
Asset Discovery Determination of the company’s outward-facing assets based on the Internet domain
Web Applications & API Discovery Detection of web applications and APis of the monitored company
Security & Compliance Monitoring Provision of precise information related to security and compliance
Multicloud Resource Discovery Identification of cloud assets
Network Services Discovery Recording the segmentation of the public network
Cyber Threat Intelligence (CTI) Providing further information, e.g. whether the company has ever been attacked, hacked or whether its data has been stolen from the system
Dark Web Monitoring Dark web monitoring to find out whether the company’s data is circulating or being traded on the dark web
Access to dark web analyses Access to numerous sources of information for analyzing dark web traffic
buy buy buy buy request

If required, we also offer a managed service tailored to your needs, in which we carry out a monthly scan for you, for example, including an evaluation and recommendations for measures.

Contact us for a consultation

We will be happy to advise you individually and with a demo.