Lexxton Cyber Risk Assessment CYRA
Recognize attack risk. Close vulnerabilities.
CYRA is an external vulnerability scan that scans and assesses a company’s outward-facing network infrastructure, systems and applications for potential vulnerabilities.
This simulates attacks on the network from the outside in order to find and close gaps or vulnerabilities that malicious hackers could exploit, such as open ports, unprotected assets or firewall vulnerabilities.
Where is your company vulnerable to cybercrime?
Cyber attack simulation
Lexxton CYRA automates the typical process of a cyber attack – i.e. the planning and preparation phase with targeted information gathering and reconnaissance.
Analysis of weak points
The automated asset discovery scans target the attack surface of assets, information and services.
Analysis of the attack surface
Document and analyze your company’s attack surface with the neutral view of CYRA, which enables you to anticipate the activities of cyber criminals.
Identification of business risks
The assessment provides important information about how and where your company is exposed and generates informative reports on your company’s risk potential.
Protection of the company
The scan alerts your team to the countermeasures required to keep your company secure.
Analyze your public attack surface with Lexxton CYRA
Scan of the public attack surface
Lexxton CYRA performs a passive reconnaissance and discovers your publicly accessible assets.
Findings of vulnerability
CYRA measures hundreds of parameters to analyze the company’s cyber security situation and documents where problems may occur.
Qualification of your team
Our platform creates a detailed risk report that summarizes the risk to your business and shows how your team can mitigate the risk.
Lexxton CYRA analyzed
- Domain Security
- Network Security
- IP Security
- AS Security
- Web Security
- Typosquatting
Automated continuous risk monitoring
Automatic assessment
The CYRA platform is automated and requires no manual intervention. We offer a range of license packages to suit your business needs.
The platform generates alerts and recommendations as new vulnerabilities are discovered and automatically updates the Digital Risk Score.
The updates provide the organization with complete visibility into its publicly accessible digital assets (websites, servers, networks, etc.) and enables remediation actions.
Evaluation using risk score
After analyzing each detected asset, an AI-supported algorithm calculates all the information and creates an overall assessment of the company’s cyber situation. This rating is expressed as a number from 0 (insecure) to 100 (most secure) and is divided into five categories, which are color-coded for quick identification.
A rating above 90 is considered very good, a rating below 70 means that measures need to be taken. A rating of less than 50 means that obvious weaknesses need to be rectified urgently.
Cyber Threat Intelligence (CTI)
Lexxton CYRA analyzes all digital paths of cybercrime. By analyzing threat data, patterns can be identified that can be used to implement security measures to protect against future attacks.
Data Leaks: Search and analysis of company e-mail addresses with proof of passwords used, password hashes and empty password records.
Darknet: Analysis of instances on the Darknet that affect the target and are distributed in closed environments such as criminal forums, chats, etc.
Botnet: Search and analyze devices infected with botnet malware, with evidence of the exfiltrated files available to the cybercriminals.
Services & Prices
Single scan | CYRA Online Access | |||||
---|---|---|---|---|---|---|
Feature | Content | «SINGLE» | «SMALL» | «MEDIUM» | «LARGE» | «ENTERPRISE» |
CHF/EUR 990 | CHF/EUR 3’900 | CHF/EUR 5’900 | CHF/EUR 8’900 | on request | ||
Update | Number of CYRA scans | 1x dynamic PDF report | monthly | 2-weekly | weekly | customized |
Max monitored assets | Number of recognized assets, i.e. IP addresses and/or domains including network. | 500 | 100 | 200 | 500 | 5000 |
Number of companies | Number of group companies incl. various domains | × | 1 | 1 | 1 | 10 |
Third party monitoring | Supplier risk assessment and profile, including financial implications in the event of an attack | × | 1 | 3 | 10 | 30 |
Enduser Login | Online access to the platform | × | ✓ | ✓ | ✓ | ✓ |
Security Assessment Management Summary | Summary overview after the risk assessment has been carried out or while it is still running (in real time) | ✓ | ✓ | ✓ | ✓ | ✓ |
Security assessment | final rating of the total assets discovered and based on the results from 0 to 100, where 0 is poor and 100 is excellent | ✓ | ✓ | ✓ | ✓ | ✓ |
Vulnerability monitoring | List and details of known vulnerabilities and misconfigurations in detected objects | ✓ | ✓ | ✓ | ✓ | ✓ |
Report creation | Creation of dynamic reports in various languages (EN, DE, FR, IT, ES) | one-time | ✓ | ✓ | ✓ | ✓ |
Asset Discovery | Determination of the company’s outward-facing assets based on the Internet domain | ✓ | ✓ | ✓ | ✓ | ✓ |
Web Applications & API Discovery | Detection of web applications and APis of the monitored company | ✓ | ✓ | ✓ | ✓ | ✓ |
Security & Compliance Monitoring | Provision of precise information related to security and compliance | ✓ | ✓ | ✓ | ✓ | ✓ |
Multicloud Resource Discovery | Identification of cloud assets | ✓ | ✓ | ✓ | ✓ | ✓ |
Network Services Discovery | Recording the segmentation of the public network | ✓ | ✓ | ✓ | ✓ | ✓ |
Cyber Threat Intelligence (CTI) | Providing further information, e.g. whether the company has ever been attacked, hacked or whether its data has been stolen from the system | ✓ | ✓ | ✓ | ✓ | ✓ |
Dark Web Monitoring | Dark web monitoring to find out whether the company’s data is circulating or being traded on the dark web | ✓ | ✓ | ✓ | ✓ | ✓ |
Access to dark web analyses | Access to numerous sources of information for analyzing dark web traffic | ✓ | ✓ | ✓ | ✓ | ✓ |
buy | buy | buy | buy | request |
If required, we also offer a managed service tailored to your needs, in which we carry out a monthly scan for you, for example, including an evaluation and recommendations for measures.
Contact us for a consultation
We will be happy to advise you individually and with a demo.