Skip to main content

Is insysvideotechnologies.com a Scam? Security Check Results - Insys Reviews

insysvideotechnologies.com favicon

Is insysvideotechnologies.com Safe? Security Analysis for Insys

Check if insysvideotechnologies.com is a scam or legitimate. Free security scan and reviews.

TechnologyN/amedium
WordPressjQuerySlick CarouselGoogle Tag ManagerGoogle Analytics+1 more
Analyzed 8/1/2025Completed 1:04:21 AM
46
Security Score
HIGH RISK

AI Summary

Insys Video Technologies is a technology company specializing in scalable OTT and video streaming solutions, including live and VOD streaming, multi-DRM content protection, and AWS-certified professional services. Their market position is that of a specialized provider targeting businesses requiring secure and scalable video delivery. The website demonstrates a moderate level of digital maturity, leveraging WordPress CMS, modern JavaScript libraries, and integrated analytics and consent management tools. Security posture is adequate with HTTPS and cookie consent mechanisms in place, but lacks visible security headers and formal security policies. Privacy compliance is partially addressed through cookie consent but lacks a dedicated privacy policy or terms of service pages. Overall, the website is professional and trustworthy, with room for improvements in security and compliance documentation.

Detected Technologies

WordPressjQuerySlick CarouselGoogle Tag ManagerGoogle AnalyticsCookieYes Consent Management

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

The company operates in the technology sector, focusing on OTT streaming and DRM solutions. Their business model appears to be B2B SaaS combined with professional consulting services. Key competitive advantages include AWS partnership and multi-device streaming capabilities. The target customers are broadcasters, telecoms, media companies, and enterprises needing secure video delivery. The website content and product offerings indicate a medium-sized company founded in 2017. The partnership ecosystem includes AWS and LinkedIn (for cookies). Growth indicators are not explicitly stated but the presence of multiple product lines and professional services suggests expansion. Strategic observations include the need to enhance transparency with privacy and security policies to build further trust.

Security Posture Analysis

Comprehensive Security Assessment

The security maturity level is moderate. HTTPS is enforced, and cookie consent is implemented with granular user controls. However, the absence of security headers such as Content Security Policy, HSTS, and X-Frame-Options reduces the overall security posture. No vulnerabilities or exposed sensitive data were detected in the HTML content. Compliance gaps include missing privacy policy and incident response contact information. The company does not publish a vulnerability disclosure or security.txt file, which could improve transparency and incident handling. Overall, the security culture appears functional but could benefit from formalized policies and enhanced technical controls.

Strategic Recommendations

Priority Actions for Security Improvement

1

Enable DNSSEC on the domain to improve DNS security and prevent spoofing.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Insys

Description:

Empower your business with scalable OTT and video streaming solutions tailored for secure, seamless online content delivery.

Key Services:
Insys Go - live and VOD streaming on multiple devicesCloud Video Kit - streaming feature toolsCloud DRM - multi-DRM content protectionProfessional Services - AWS-certified custom solutions
Content Quality:

good

Branding:

consistent

Technical Stack

Technologies:
WordPressjQuerySlick CarouselGoogle Tag ManagerGoogle AnalyticsCookieYes Consent Management
Frameworks:
WordPress
Platforms:
Web
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
75/100
Best Practices:
  • HTTPS enabled
  • Cookie consent with granular controls
  • No exposed sensitive data in HTML

Analytics & Tracking

Services:
Google Analytics
Tracking Level:moderate
Privacy Compliance:basic

Advertising & Marketing

Transparency Level:basic

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:good
Navigation Clarity:good
Professionalism:good
Trustworthiness:moderate

Key Observations

1

Website uses WordPress CMS with modern front-end libraries.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

83/100
Score

No Data Protection Officer mentioned

LOW

Large organizations may need to designate a DPO under GDPR

Privacy policy may not be GDPR compliant

MEDIUM

Privacy policy lacks explicit GDPR compliance elements

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

25/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

40/100
Score

No SPF record found

HIGH

SPF helps prevent email spoofing

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

No email authentication configured

CRITICAL

Domain is vulnerable to email spoofing

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

52/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 47 days

Weak SSL Key Length

HIGH

SSL certificate uses 256-bit key, which is considered weak

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

75/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

No DMARC Record

MEDIUM

DMARC policy not configured

DNS Records

A Records:185.135.88.144
Name Servers:
ns10.az.plDNS only
ns11.az.plDNS only
ns12.az.plDNS only
SOA:Serial: 1735636415, TTL: 3600s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:119ms

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

0/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer

Service Exposed: SSH

MEDIUM

Port 22 (SSH) is publicly accessible - SSH - Secure but can be brute-forced

Critical Service Exposed: MySQL

CRITICAL

Port 3306 (MySQL) is publicly accessible - MySQL - Database server

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built on WordPress CMS with jQuery and Slick Carousel for UI components. It uses Google Tag Manager and Google Analytics for tracking and CookieYes for consent management. The site is mobile optimized with responsive design and good SEO metadata including Open Graph and JSON-LD structured data. Hosting details are not explicit but DNS is managed via Key-Systems GmbH with nameservers at az.pl. Performance is moderate with asynchronous loading of scripts. Accessibility is basic with some ARIA roles and semantic HTML. Technical risks include lack of DNSSEC and missing security headers which could be exploited. Modernization opportunities include enhancing security controls and improving privacy compliance documentation.
Analyze Another Website