Skip to main content

Is inventarizuj.cz a Scam? Security Check Results - NEXTERA tech s.r.o. Reviews

inventarizuj.cz favicon

Is inventarizuj.cz Safe? Security Analysis for NEXTERA tech s.r.o.

Check if inventarizuj.cz is a scam or legitimate. Free security scan and reviews.

TechnologyCzech Republicsmall
JavaScriptGoogle Tag ManagerRFID technology integration
Analyzed 7/31/2025Completed 4:43:35 AM
51
Security Score
MEDIUM RISK

AI Summary

Inventarizuj.cz is a Czech Republic-based technology company specializing in RFID-enabled asset inventory solutions. Their platform integrates with existing ERP systems to automate and streamline asset management processes, targeting businesses seeking efficient inventory control. The website demonstrates a professional and consistent brand presence with clear business contact information and client/partner endorsements, positioning the company as a niche player in the RFID inventory market. Technically, the website employs modern web technologies including JavaScript and Google Tag Manager, with mobile optimization and responsive design evident. The platform offers an Android app accessible via Google Play, indicating multi-platform support. While performance is moderate, SEO and accessibility are adequately addressed. However, some security best practices such as security headers and cookie consent mechanisms are missing. Security posture is generally good with HTTPS enforced and no visible vulnerabilities in the HTML content. The absence of WHOIS data reduces transparency but does not significantly detract from the site's legitimacy given the professional content and clear business information. Privacy policy is present and GDPR compliance appears considered, though cookie consent is lacking. Overall, Inventarizuj.cz presents a credible and professional business with a solid technical foundation and moderate security maturity. Strategic improvements in security headers, cookie consent, and transparency of domain registration would enhance trust and compliance.

Detected Technologies

JavaScriptGoogle Tag ManagerRFID technology integration

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

Inventarizuj.cz operates in the technology sector, focusing on RFID-based inventory management solutions integrated with ERP systems. Their business model is B2B SaaS, serving organizations requiring automated asset tracking. The company maintains partnerships with recognized hardware providers like Zebra and Honeywell, enhancing its market credibility. Client logos from universities and regional institutions indicate a stable customer base. Revenue streams likely include software licensing, integration services, and hardware sales or leasing. Growth potential exists through expanding ERP integrations and geographic reach. The partnership ecosystem supports technology and hardware supply, while the parent company NEXTERA tech s.r.o. provides operational backing.

Extracted Contact Information

Marketing Intelligence Data

Email Addresses (1)

r*****@nexteratech.cz

Phone Numbers (1)

+4207346*****

Company Registration

Legal Name:

NEXTERA tech s.r.o.

VAT Number:

CZ09688633

Registration Number:

09688633

Security Posture Analysis

Comprehensive Security Assessment

The website enforces HTTPS with a valid SSL certificate, ensuring encrypted communications. However, the absence of security headers such as Content Security Policy (CSP), X-Frame-Options, and HSTS reduces defense-in-depth. No incident response or security policy information is published, limiting transparency on security governance. The site uses Google Tag Manager and Analytics, indicating moderate user tracking without explicit cookie consent mechanisms, which may pose GDPR compliance risks. No vulnerabilities or exposed sensitive data were detected in the HTML content. Overall, the security maturity is moderate but could be improved with enhanced headers, cookie consent, and published security policies.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement comprehensive security headers including CSP, HSTS, and X-Frame-Options to strengthen browser security.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

NEXTERA tech s.r.o.

Description:

Inventarizuj is an online platform utilizing RFID technology for efficient and automated asset inventory management.

Key Services:
RFID-based asset inventoryERP system integrationAutomated reporting
Content Quality:

good

Branding:

consistent

Technical Stack

Technologies:
JavaScriptGoogle Tag ManagerRFID technology integration
Platforms:
WebAndroid (via Google Play app)
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • No exposed sensitive data in HTML

Analytics & Tracking

Services:
Google Analytics
Tracking Level:moderate
Privacy Compliance:basic

Advertising & Marketing

Tracking Pixels:
Google Analytics (via Google Tag Manager)
Transparency Level:basic

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:good
Navigation Clarity:good
Professionalism:good
Trustworthiness:high

Key Observations

1

Website is fully accessible with no blocking or WAF challenges.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

60/100
Score

Weak X-Frame-Options configuration

LOW

Current value: "SAMEORIGIN, SAMEORIGIN"

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Weak Referrer-Policy configuration

LOW

Current value: "no-referrer-when-downgrade"

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

28/100
Score

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

No Data Protection Officer mentioned

LOW

Large organizations may need to designate a DPO under GDPR

Privacy policy may not be GDPR compliant

MEDIUM

Privacy policy lacks explicit GDPR compliance elements

EU business without adequate privacy measures

CRITICAL

EU businesses are subject to strict GDPR requirements

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

2/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: transport, digital

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

70/100
Score

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:mx.ovh.com -all
DNS Lookups:1/10
Policy:-all

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

72/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 37 days

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.2TLSv1.3TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

75/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

No DMARC Record

MEDIUM

DMARC policy not configured

DNS Records

A Records:185.58.41.18
Name Servers:
dns102.ovh.netDNS only
ns102.ovh.netDNS only
MX Records:
5: mx2.mail.ovh.net
100: mx3.mail.ovh.net
1: mx1.mail.ovh.net
SOA:Serial: 2025072500, TTL: 60s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:196ms

SPF Analysis

SPF Record:
v=spf1 include:mx.ovh.com -all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

20/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website uses a modern JavaScript-based front-end with bundled CSS and JS assets, indicating a build process and optimization. Google Tag Manager is used for analytics and tracking. The site is mobile responsive with adaptive images for desktop and mobile. No CMS or hosting provider is explicitly identified. Performance is moderate, with potential improvements in caching and asset delivery. Accessibility is basic but could be enhanced with ARIA roles and semantic HTML. SEO is supported by meta tags and Open Graph data. The lack of security headers and cookie consent are technical gaps. Overall, the infrastructure is solid but can benefit from security and privacy enhancements.
Analyze Another Website