
Is eworx.at Safe? Security Analysis for eworx Network & Internet GmbH
Check if eworx.at is a scam or legitimate. Free security scan and reviews.
AI Summary
eworx Network & Internet GmbH is a medium-sized Austrian technology company specializing in IT services, email and event marketing solutions, and datacenter hosting. Their website presents a professional and comprehensive overview of their offerings, targeting businesses seeking reliable IT infrastructure and digital marketing tools. The company maintains a strong market position with notable clients and a consistent brand image. Technically, the website is built on TYPO3 CMS, employs modern JavaScript modules, and integrates SEO and cookie consent best practices. Security posture is solid with HTTPS and cookie consent mechanisms, though formal security policies and incident response contacts are absent. Overall, the site is trustworthy, well-structured, and compliant with GDPR requirements.
Detected Technologies
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Business Intelligence
Market & Strategic Analysis
The company operates primarily in the B2B technology sector, offering integrated IT and marketing services. Their business model focuses on providing tailored IT infrastructure management, Microsoft 365 solutions, and a proprietary marketing suite for email and event campaigns. The presence of reputable client logos and multi-channel social media engagement indicates a mature market presence. The company leverages partnerships with major ad and analytics platforms such as Google, Facebook, and LinkedIn for marketing and tracking. Growth indicators include a comprehensive career section and emphasis on digital transformation services.
Extracted Contact Information
Marketing Intelligence Data
Email Addresses (1)
Phone Numbers (1)
Physical Addresses (1)
Security Posture Analysis
Comprehensive Security Assessment
The website demonstrates a good security maturity level with enforced HTTPS, detailed cookie consent with opt-out options, and no visible exposure of sensitive data. However, the absence of explicit security policies, incident response information, and vulnerability disclosure mechanisms suggests room for improvement in transparency and preparedness. No critical vulnerabilities or suspicious patterns were detected. The use of third-party tracking and marketing cookies is managed with user consent, aligning with GDPR standards.
Strategic Recommendations
Priority Actions for Security Improvement
Publish a dedicated security policy page outlining security practices and commitments.
✨Observations
AI-powered comprehensive website and business analysis.
AI-Enhanced Website Analysis
Business Insights
eworx Network & Internet GmbH
eworx bietet umfassendes Know-how bei EDV-Betreuung und E-Mail Marketing. Spezialisiert auf digitale Marketingkommunikation und IT-Dienstleistungen.
excellent
consistent
Technical Stack
moderate
good
good
good
Security Assessment
- HTTPS enforced
- Cookie consent with opt-out and detailed categories
- No exposed sensitive data in HTML
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website is fully accessible with no blocking or WAF challenges
🛡️Security Headers
HTTP security headers analysis and recommendations.
Security Headers
HTTP security headers analysis
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended)
Missing Referrer-Policy header
LOWControls referrer information sent with requests
Missing Permissions-Policy header
MEDIUMControls browser features and APIs
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
GDPR Compliance
Privacy and data protection assessment
No Data Protection Officer mentioned
LOWLarge organizations may need to designate a DPO under GDPR
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
NIS2 Compliance
Network & Information Security Directive
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity
No security contact information
HIGHNIS2 requires clear incident reporting channels
No vulnerability reporting mechanism
MEDIUMClear vulnerability reporting supports coordinated disclosure
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts
Critical sector without clear security compliance
HIGHDetected sectors: energy, transport, banking, digital
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Email Security
SPF, DKIM, and DMARC validation
No MTA-STS Policy
MEDIUMMTA-STS enforces TLS for email delivery
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues
SPF Details
DKIM Selectors Found
DMARC Details
🏆SSL/TLS Security
Certificate validity and encryption analysis.
SSL/TLS Security
Certificate validity and encryption analysis
Unable to retrieve SSL certificate
CRITICALCould not establish secure connection to retrieve certificate information
OCSP Status
📊DNS Health
DNS configuration and security assessment.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain
CAA Records Not Configured
LOWCertificate Authority Authorization (CAA) records not found
DNS Records
DNSSEC Status
DNS Performance
SPF Analysis
⚡Network Security
Port scanning and network exposure analysis.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Technical Analysis
Comprehensive security assessment findings