www.secureme2.eu Open in urlscan Pro
2a00:9b60:0:4:1c00:a2ff:fe00:11c1  Public Scan

Submitted URL: https://secureme2.be/
Effective URL: https://www.secureme2.eu/en/
Submission: On August 18 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

Name: New FormPOST

<form class="elementor-form" method="post" name="New Form">
  <input type="hidden" name="post_id" value="2756">
  <input type="hidden" name="form_id" value="2cbf3b6d">
  <input type="hidden" name="referer_title" value="SecureMe2 Cyberalarm - SecureMe2 Cyber Security">
  <input type="hidden" name="queried_id" value="777">
  <div class="elementor-form-fields-wrapper elementor-labels-">
    <div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_c56a54c elementor-col-100 recaptcha_v3-bottomright">
      <div class="elementor-field" id="form-field-field_c56a54c">
        <div class="elementor-g-recaptcha" data-sitekey="6LcXJQ8gAAAAAAOE2b-wZSyL7jL8o7d2tT0oEcC3" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcXJQ8gAAAAAAOE2b-wZSyL7jL8o7d2tT0oEcC3&amp;co=aHR0cHM6Ly93d3cuc2VjdXJlbWUyLmV1OjQ0Mw..&amp;hl=de&amp;type=v3&amp;v=mq0-U1BHZ5YTcoDC-CvsLPNc&amp;size=invisible&amp;badge=bottomright&amp;sa=Form&amp;cb=v1ih57yeugv9"
                width="256" height="60" role="presentation" name="a-y5sngrz052b1" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
                data-lf-yt-playback-inspected-belvo73vwkv8zmqj="true"></iframe></div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;" data-lf-yt-playback-inspected-belvo73vwkv8zmqj="true"></iframe>
        </div>
      </div>
    </div>
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-60 elementor-sm-100 elementor-field-required">
      <label for="form-field-email" class="elementor-field-label elementor-screen-only"> Email </label>
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-md  elementor-field-textual" placeholder="Your email" required="required" aria-required="true">
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-40 e-form__buttons elementor-sm-100">
      <button type="submit" class="elementor-button elementor-size-lg">
        <span>
          <span class="elementor-align-icon-right elementor-button-icon">
            <i aria-hidden="true" class="fas fa-paper-plane"></i> </span>
          <span class="elementor-button-text">Subscribe</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

Ook wij gebruiken cookies...


Om de beste ervaringen te bieden, gebruiken wij technologieën zoals cookies om
informatie over je apparaat op te slaan en/of te raadplegen. Door in te stemmen
met deze technologieën kunnen wij gegevens zoals surfgedrag of unieke ID's op
deze site verwerken. Als je geen toestemming geeft of uw toestemming intrekt,
kan dit een nadelige invloed hebben op bepaalde functies en mogelijkheden.
Functioneel Functioneel Always active
De technische opslag of toegang is strikt noodzakelijk voor het legitieme doel
het gebruik mogelijk te maken van een specifieke dienst waarom de abonnee of
gebruiker uitdrukkelijk heeft gevraagd, of met als enig doel de uitvoering van
de transmissie van een communicatie over een elektronisch communicatienetwerk.
Voorkeuren Voorkeuren
De technische opslag of toegang is noodzakelijk voor het legitieme doel
voorkeuren op te slaan die niet door de abonnee of gebruiker zijn aangevraagd.
Statistieken Statistieken
De technische opslag of toegang die uitsluitend voor statistische doeleinden
wordt gebruikt. De technische opslag of toegang die uitsluitend wordt gebruikt
voor anonieme statistische doeleinden. Zonder dagvaarding, vrijwillige naleving
door uw Internet Service Provider, of aanvullende gegevens van een derde partij,
kan informatie die alleen voor dit doel wordt opgeslagen of opgehaald gewoonlijk
niet worden gebruikt om je te identificeren.
Marketing Marketing
De technische opslag of toegang is nodig om gebruikersprofielen op te stellen
voor het verzenden van reclame, of om de gebruiker op een website of over
verschillende websites te volgen voor soortgelijke marketingdoeleinden.
Manage options Manage services Manage vendors Read more about these purposes

Accepteren Weigeren Instellingen Opslaan Instellingen
Cookie policy Privacy Policy {title}
Skip to content
 * Products
    * Cyberalarm for SMB
    * Cyberalarm Pro for Enterprise

 * Industries
    * Hightech
    * Healthcare

 * About
    * About SecureMe2
    * News & insights
    * Partners
    * Cases

 * ···


 * Contact
    * Contact details
    * FAQ

 * * 
 * ···

Login
 * Products
    * Cyberalarm for SMB
    * Cyberalarm Pro for Enterprise

 * Industries
    * Hightech
    * Healthcare

 * About
    * About SecureMe2
    * News & insights
    * Partners
    * Cases

 * ···


 * Contact
    * Contact details
    * FAQ

 * * 
 * ···

Login
Contact Us
 * Home
 * Products
   * Cyberalarm
   * Cyberalarm Pro
 * Industries
   * Healthcare
   * Hightech
 * About
   * About SecureMe2
   * News & Insights
   * Partners
   * Cases
 * Contact
   * Contact details
   * FAQ
 * Dutch
 * English

Menu
 * Home
 * Products
   * Cyberalarm
   * Cyberalarm Pro
 * Industries
   * Healthcare
   * Hightech
 * About
   * About SecureMe2
   * News & Insights
   * Partners
   * Cases
 * Contact
   * Contact details
   * FAQ
 * Dutch
 * English


ENHANCE YOUR CYBER SECURITY.

Always protected against cyber crime with SecureMe2 Cyberalarm
Discover SecureMe2
Free trial period

2.5


TB

DATA PER SECOND ANALYZED


37.000


+

CONTINUOUS MONITORING OF COMPUTERS


MONITORS YOUR NETWORK 24/7.

 * Development and support in The Netherlands
 * Independent of IT suppliers
 * Immediately 24/7 realtime insights, without configuration
 * Personalised and clear dashboard


CYBERALARM
FOR SMB.

Information is the heart of your business. It is important to protect that
information by monitoring your IT landscape 24/7. Immediate alarm in the event
of a digital break-in.
Read more about Cyberalarm


CYBERALARM PRO
FOR ENTERPRISE.

Large organizations have complex IT environments. Cyberalarm Pro unburdens you
and helps you make the right choices. Detection of malicious traffic, shadow IT,
and device configuration errors.
Read more about Cyberalarm Pro


CLIENT TESTIMONIALS.

“CYBERALARM PRO FROM SECUREME2, ENABLES US TO GUARANTEE THE CONTINUITY OF OUR
PRODUCTION LINES. THANKS TO THE REAL-TIME INSIGHTS THEY PROVIDE, WE CAN
IMMEDIATELY DEAL WITH MALICIOUS BEHAVIOUR OR MISUSE OF SYSTEMS.”

CFO – Harvill Food Group BV

“THIS IS GREAT, I HAVE BEEN ABLE TO BAN MANY THREATS FROM MY NETWORK WITH
CYBERALARM SO FAR. JUST GREAT! WE ARE ABLE TO MONITOR EVERYTHING THAT IS
HAPPENING IN OUR ONLINE SPACE, WHILE WITHOUT CYBERALARM YOU EASILY MISS
SOMETHING. FORGET IT, CHECK IT.”

System Administrator – Alfa Bier
“As far as I’m concerned, two rules apply in the world of technical cyber
resilience: 1) there are no rules and 2) without insight there is no overview.
We have deployed Cyberalarm as one of the first steps within the Managed
Detection and Response Service that we set up. From the role of ‘independent
watchdog’ and as a supplier of current Cyber Threat Intelligence data, our MDR
is fed 24/7 with the analysis of (potentially) malicious behavior. Cyberalarm
gives us the necessary insight into our own network traffic.” IT-specialist –
municipality of Enschede


HOW CYBERALARM KEEPS YOUR NETWORK SAFE.

Cyberalarm works with a local sensor (physical or virtual) that captures all
traffic in the network and prepares it for analysis. The analysis of the failing
measures provides immediate insight into the impact of a digital attack.
 * Undetectable in the network
 * Uses many sources of Cyber Threat Intelligence data
 * Traffic is analyzed retroactively for new threats
 * Sensors available for any type of network (connectivity and bandwidth)
 * No delay (latency) in the network
 * Comes as a mini appliance, server or virtual appliance
 * Available for Microsoft Azure, Google Cloud and Amazon Web Services

More about Cyberalarm



PROVIDES EXACTLY THE INSIGHT WE NEED AS AN ORGANIZATION

★★★★★ 5/5
“It works very well. For example, the system immediately detected a network
printer that was approached from Ukraine via an open port. In retrospect, the
impact was not that bad, but I would never have seen that without this
solution.”


MAASSTAD HOSPITAL

John -Teamlead


TRUSTED
BY 850+ ORGANIZATIONS.

More than 850 companies worldwide use Cyberalarm or Cyberalarm Pro
0


+

SENSORS

0


+

COUNTRIES

0


+

PARTNERS

0


+

CLIENTS


READING MATERIAL & HIGHLIGHTS.

Insights


HOW DO YOU INCREASE THE CYBER RESILIENCE OF YOUR IT LANDSCAPE?

+ Read more
05/16/2022
How safe is my organization?
An organization that does not arm its IT landscape against digital threats such
as hackers and ransomware is likely to fall victim to hackers. The question is
not if, but when it will happen. The better protected and the higher the quality
of the monitoring for unwanted intruders, the smaller the damage to the
organization. Recent studies show that the chance of a hack is 1 in 5 for
companies. Preventing a cyber incident beforehand is always cheaper than solving
a cyber incident afterwards.
Why am I a target of hackers?
I’m not a target, am I? This is an often used argument, but no longer tenable
since the GDPR. Every organization has personal data of customers, suppliers and
employees. Identities are popular, hackers can easily conclude contracts with
the name and address details, pay slips and identity documents of your
employees. This usually happens for telephone subscriptions and private lease
constructions. Virtually all organizations that have fallen victim to digital
crime in recent years were not a deliberate target but the victim of automated
attacks. The search for vulnerabilities in IT infrastructures and systems in
organizations is becoming increasingly automated. Employees are bombarded with
emails, whatsapps, text messages and messages on social media to entice them to
contact the criminals. All necessary information is available online at the
Chamber of Commerce. In addition, organizations are automatically tested for
weak passwords and vulnerabilities in technology. So everyone is a target.
I already have a firewall, isn't that enough?
A firewall blocks traffic that is preset as unwanted. This is usually traffic
that wants to enter the company from the internet. Traffic from the inside to
the outside is almost always allowed. If a part is already blocked, then ports
80, 443 and 53 are always open. Attackers therefore use methods such as phishing
to gain entry and thus communicate through the open ports. Attackers are then in
the network at that time, while the firewall is not aware of anything. The
malware can then communicate freely to the internet, making data breaches
possible. A firewall is necessary but not the ultimate goal.
How do I prepare for an incident?
A strong defence consists of standard measures, such as trainings, and technical
measures, such as firewalls, anti-virus and monitoring and detection. The latter
two execute SecureMe2 Cyberalarm. Detection sends a signal once an attacker has
succeeded despite these measures. Initially, measures are aimed at preventing an
incident. Inevitably, despite the measures taken, an incident could take place.
When it does, it is important to have the right processes, tools and knowledge
in place. Processes such as isolating networks and shutting down infected
systems allow Cyberalarm to find out how a hacker has penetrated the
organization and how to be operational again as soon as possible.


INSTANTLY SECURING YOUR IT NETWORK?

Get in toch with our security specialists
+31-85-060 5424

CONTACT US


 * +31-85-060 5424
 * info@secureme2.eu

SUBSCRIBE TO NEWSLETTER

Email
Subscribe

SOLUTIONS

 * SMB
 * Enterprise
 * Industries

RESOURCES

 * Blogs
 * Use cases
 * FAQ

ABOUT

 * About SecureMe2
 * Contact details
 * Partners
 * Responsible Disclosure

CONNECT

 * Twitter
 * LinkedIn

COPYRIGHT © SECUREME2 B.V.

 * Terms & Conditions
 * Cookie Policy
 * Privacy Policy

Cookie Instellingen