Skip to main content

Is interad.at a Scam? Security Check Results - Interad Software GmbH

interad.at favicon

Is interad.at Safe? Security Analysis for Interad Software GmbH

http://interad.at

Check if interad.at is a scam or legitimate. Free security scan and reviews.

TechnologyAustriasmall
.NETAngularJS (ng-app, ng-controller)jQueryUnslider carouselGoogle Tag Manager+3 more
Analyzed 6/15/2025Completed 9:19:24 PM
38
Security Score
LOW RISK
Exclusive insights unlocked

Unlock the complete security report for interad.at

Get full access to AI recommendations, compliance evidence, vulnerability remediation steps, and downloadable PDF reports. Upgrade once for lifetime access to this scan.

Full Report Access

All modules, AI insights, PDF download

39.90 €one-time • Incl. 21% VAT

Marketing Intelligence

Contact emails, phone numbers & warm leads

49.90 €one-time • Incl. 21% VAT

How it works

  1. Enter your email to receive the unlocked report.
  2. Complete the secure EveryPay checkout (cards & local methods supported).
  3. You’ll receive an email with your unique unlock code and the PDF export.

Already purchased?

Order summary

Domaininterad.at
Access tierFull report or marketing add-on

Digital reports are delivered immediately after payment. By continuing you acknowledge the withdrawal waiver described in our Returns & Refunds policy.

VisaMastercardApple PayGoogle Pay

Secure payments processed via EveryPay. Prices in EUR; Incl. 21% VAT.

SEQ SIA

Lastadijas 12 k-3, Riga, Latvia, LV-1050

Reg. No. 40203410806 • VAT LV40203410806

Support: guard@offseq.com+371 2256 5353

AI Summary

Interad Software GmbH is a well-established Austrian software company specializing in custom software solutions based on Microsoft .NET technologies. Founded in 2005, the company operates with a young and dynamic team fr… Unlock the full Guard report to read the complete analysis.

Detected Technologies

.NETAngularJS (ng-app, ng-controller)jQueryUnslider carouselGoogle Tag ManagerFacebook PixelGoogle AnalyticsCookieScript consent management
Continuous monitoring

Keep interad.at under constant watch

Guard tracks your live infrastructure daily: certificate expiry, DNS & mail authentication drift, uptime changes, subdomain inventory, and unexpected tracker or content shifts. A full timeline captures every diff so you can prove remediation and spot regressions instantly.

Security drift alerts

Risk score drops, new high-severity issues, and header hardening gaps

Compliance watch

GDPR / NIS2 posture changes with governance evidence snapshots

Infrastructure surface

Unexpected open services, SSL expiry, DNS & email authentication changes

Content & tracker intelligence

Marketing tech shifts, analytics drift, and AI recommendation updates

25 €
per month · billed securely via EveryPay

Cancel anytime. Alerts sent to the contacts you choose. Unlock the full report to view historical timelines and alerts.

Unlock the full Guard report to view the monitoring timeline, JSON diffs, and alert history for interad.at.

Security Headers

8 findings

15/100

GDPR Compliance

4 findings

43/100

NIS2 Compliance

10 findings

0/100

Email Security

4 findings

70/100

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Snapshot shown below. Unlock the full AI report for complete market insights, audience profiling, and step-by-step recommendations.

Business Intelligence

Market & Strategic Analysis

Interad Software GmbH holds a strong position in the Austrian software development market, leveraging its Microsoft partnerships as a competitive advantage. Their business model focuses on B2B custom software development and IT consulting, targeting medium to large enterprises requiring specialized .NET solutions. Revenue streams likely include project-based software development, temporary IT expert placements, consulting fees, and coaching services. The company’s subsidiary in Tuzla, Bosnia and Herzegovina, suggests a regional expansion strategy and access to additional talent pools. Their active participation in international developer communities and continuous employee training indicates a growth-oriented and innovation-driven culture. The partnership ecosystem includes Microsoft and possibly other technology providers, enhancing their service offerings and market reach.

Extracted Contact Information

Marketing Intelligence Data

Security Posture Analysis

Comprehensive Security Assessment

Interad’s security maturity is moderate to good. The website enforces HTTPS and implements a GDPR-compliant cookie consent mechanism, reflecting awareness of privacy and security regulations. However, the absence of advanced HTTP security headers such as Content Security Policy (CSP) and HTTP Strict Transport Security (HSTS) represents a gap that could expose the site to certain web-based attacks. The lack of a published security policy or incident response contact reduces transparency and may impact stakeholder confidence in handling security incidents. The use of multiple third-party tracking scripts introduces potential privacy and security risks that require ongoing monitoring. Overall, the security posture is adequate for the business size but could benefit from formalized policies and enhanced technical controls.

Strategic Recommendations

Priority Actions for Security Improvement

1

Upgrade to the full Guard report to access tailored remediation steps.

Observations

AI-powered comprehensive website and business analysis.

A preview of your strategic observations is visible. Upgrade to unlock the full competitive positioning, trust signals, and branding checklist.

AI-Enhanced Website Analysis

Business Insights

Company:

Interad Software GmbH

Description:

Interad is a software company based in Graz and Krumpendorf am Wörthersee, Austria, specializing in individual software solutions primarily based on Microsoft .NET technologies. They serve clients domestically and internationally with a young, dynamic team.

Key Services:
Individuelle Software LösungenIT-Experten auf ZeitSoftware-BeratungEntwickler Coaching
Content Quality:

good

Branding:

consistent

Technical Stack

Technologies:
.NETAngularJS (ng-app, ng-controller)jQueryUnslider carouselGoogle Tag ManagerFacebook PixelGoogle AnalyticsCookieScript consent management
Frameworks:
.NETAngularJS
Platforms:
Web
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
70/100
Best Practices:
  • HTTPS enforced (og:url uses https)
  • Cookie consent banner with consent mechanism
  • No exposed sensitive data in HTML
  • Use of Google Tag Manager and Facebook Pixel with async loading

Analytics & Tracking

Services:
Google AnalyticsGoogle Tag ManagerFacebook Pixel
Tracking Level:moderate
Privacy Compliance:good

Advertising & Marketing

Ad Networks:
Google AdsDoubleClick
Tracking Pixels:
Facebook Pixel
Marketing Tools:
Facebook Pixel
Transparency Level:good

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:good
Navigation Clarity:good
Professionalism:good
Trustworthiness:high

Key Observations

1

Website is professionally designed and content-rich.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Some header findings are shown. Unlock to see the full checklist, impacted endpoints, and remediation guidance.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections Unlock the full report to read the complete fix.

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks Unlock the full report to read the complete fix.

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing Unlock the full report to read the complete fix.

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load Unlock the full report to read the complete fix.

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended) Unlock the full report to read the complete fix.

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests Unlock the full report to read the complete fix.

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs Unlock the full report to read the complete fix.

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages Unlock the full report to read the complete fix.

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

Preview of GDPR checkpoints is visible. Unlock to reveal full evidence, policy excerpts, and DPIA guidance.

GDPR Compliance

Privacy and data protection assessment

43/100
Score

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies Unlock the full report to read the complete fix.

No Data Protection Officer mentioned

LOW

Large organizations may need to designate a DPO under GDPR Unlock the full report to read the complete fix.

Privacy policy may not be GDPR compliant

MEDIUM

Privacy policy lacks explicit GDPR compliance elements Unlock the full report to read the complete fix.

No HTTPS encryption

CRITICAL

GDPR requires appropriate security measures for personal data Unlock the full report to read the complete fix.

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

You can see headline NIS2 checks. Upgrade to access the full control mapping, severity breakdown, and remediation plan.

NIS2 Compliance

Network & Information Security Directive

0/100
Score

No HTTPS encryption

CRITICAL

NIS2 requires appropriate technical measures including encryption Unlock the full report to read the complete fix.

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures Unlock the full report to read the complete fix.

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure Unlock the full report to read the complete fix.

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management Unlock the full report to read the complete fix.

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans Unlock the full report to read the complete fix.

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity Unlock the full report to read the complete fix.

No security contact information

HIGH

NIS2 requires clear incident reporting channels Unlock the full report to read the complete fix.

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure Unlock the full report to read the complete fix.

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts Unlock the full report to read the complete fix.

Critical sector without clear security compliance

HIGH

Detected sectors: energy, transport, banking, digital Unlock the full report to read the complete fix.

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Quick view of email authentication checks is provided. Unlock to uncover full DNS evidence, record diffs, and fix scripts.

Email Security

SPF, DKIM, and DMARC validation

70/100
Score

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails Unlock the full report to read the complete fix.

No BIMI Record

LOW

BIMI displays brand logos in email clients Unlock the full report to read the complete fix.

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery Unlock the full report to read the complete fix.

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues Unlock the full report to read the complete fix.

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:spf.protection.outlook.com -all
DNS Lookups:1/10
Policy:-all

🏆SSL/TLS Security

Certificate validity and encryption analysis.

This is a teaser of the TLS audit. Unlock to view certificate chains, cipher support tables, and remediation steps.

SSL/TLS Security

Certificate validity and encryption analysis

0/100
Score

No HTTPS Encryption

CRITICAL

Website does not use HTTPS encryption, making all data transmission vulnerable to interception Unlock the full report to read the complete fix.

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

Unlock the full DNS posture audit to reveal misconfigurations, zone records, and actionable fixes.

DNS Health

DNS configuration and security assessment

75/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain Unlock the full report to read the complete fix.

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found Unlock the full report to read the complete fix.

No DMARC Record

MEDIUM

DMARC policy not configured Unlock the full report to read the complete fix.

DNS Records

A Records:104.47.142.234
Name Servers:
ns1.nameservice.atDNS only
ns2.nameservice.atDNS only
MX Records:
10: interad-at.mail.protection.outlook.com
SOA:Serial: 2025061602, TTL: 3600s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:104ms

SPF Analysis

SPF Record:
v=spf1 include:spf.protection.outlook.com -all

Network Security

Port scanning and network exposure analysis.

See a glimpse of exposed services. Unlock to access full port inventories, CVE lookups, and mitigation priorities.

Network Security

Port scanning and network exposure analysis

20/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer Unlock the full report to read the complete fix.

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Unlock to view the complete technical breakdown, stack fingerprinting, and hardening checklist.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

Unlock the full Guard report to review the complete technical breakdown and AI recommendations.
⭐ Verified Community Reviews

What others say about interad.at

Share your experience to help others make informed decisions. We verify every review by email and publish it once our moderation team approves it.

Overall rating
Select a rating
4000 characters remaining

We’ll email you to confirm your review and keep your details private.

Community rating

out of 5

0 reviews published

Loading reviews…

How did we do?

Your feedback directly shapes our roadmap. Rate the quality of this report, leave an optional comment, and let us know if you want our security specialists to follow up.

Overall report quality
Select a rating
2000 characters remaining

We only use your feedback to improve Guard reports. Contact details are never shared.

Analyze Another Website