Skip to main content

Is profoundlogic.com a Scam? Security Check Results - Profound Logic Reviews

profoundlogic.com favicon

Is profoundlogic.com Safe? Security Analysis for Profound Logic

Check if profoundlogic.com is a scam or legitimate. Free security scan and reviews.

TechnologyN/amedium
WordPressElementorYoast SEOGoogle AnalyticsHubSpot+5 more
Analyzed 9/5/2025Completed 9:46:27 AM
66
Security Score
MEDIUM RISK

AI Summary

Profound Logic is a specialized technology company focused on transforming IBM i (AS/400) legacy systems into modern, AI-enhanced platforms. With over 25 years of experience, they provide a comprehensive suite of solutions including transformation tools, AI integration, development services, and API integration. Their market position is that of an established niche player serving IT teams and businesses reliant on IBM i systems, helping them modernize while preserving critical business logic. The website reflects a mature digital presence with professional design, clear messaging, and extensive content about their offerings. Technically, the website is built on WordPress using Elementor and integrates multiple analytics and marketing tools such as Google Analytics, HubSpot, Facebook Pixel, and Hotjar. The site is mobile-optimized, accessible, and SEO-friendly. Security posture is good with HTTPS enforced and no obvious vulnerabilities, though some security headers could be improved. Privacy compliance is well addressed with clear privacy and cookie policies and consent mechanisms. The WHOIS data is notably missing or unavailable, which raises some concerns about domain registration transparency. However, the website content and business information appear consistent and professional, mitigating some trust concerns. No WAF or blocking mechanisms were detected, allowing full content access and analysis. Overall, Profound Logic presents a credible and professional business with a strong focus on IBM i modernization and AI futurization, supported by a technically sound and user-friendly website. Some improvements in security headers and domain registration transparency are recommended to enhance trust and security posture.

Detected Technologies

WordPressElementorYoast SEOGoogle AnalyticsHubSpotFacebook PixelMonsterInsightsjQueryVimeo Player APIYouTube Iframe API

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

Profound Logic operates in the technology sector, specializing in IBM i legacy system modernization and AI-driven transformation. Their business model is B2B, targeting IT departments and enterprises using IBM i systems. They leverage a combination of proprietary software products and professional services including transformation tools, AI solutions, development platforms, and integration services. The company has a strong partnership ecosystem and a history of over 25 years, positioning them as a trusted provider in their niche. Their marketing emphasizes innovation balanced with preservation of legacy investments, appealing to organizations facing challenges with retiring RPG developers and outdated interfaces. The presence of client logos and awards indicates market recognition and competitive advantage. Growth indicators include active content marketing, a partner network, and customer enablement resources.

Extracted Contact Information

Marketing Intelligence Data

Email Addresses (1)

i*****@profoundlogic.com

Phone Numbers (1)

+1937439****

Security Posture Analysis

Comprehensive Security Assessment

The website demonstrates a good security maturity level with HTTPS enforced and no visible exposure of sensitive data. Security headers are partially implemented but could be enhanced by adding Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options headers. The use of multiple third-party analytics and marketing scripts introduces some risk, but these are loaded asynchronously to mitigate performance impact. No explicit security policies, incident response plans, or vulnerability disclosure mechanisms were found, indicating potential gaps in transparency and readiness. GDPR compliance is addressed through privacy and cookie policies with consent mechanisms. Overall, the security posture is solid for a marketing website but could benefit from formalized security documentation and improved header configurations.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement comprehensive security headers including Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options to enhance protection against common web attacks.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Profound Logic

Description:

Profound Logic helps transform IBM i (AS/400) legacy systems with AI-enhanced futurization solutions. With 25+ years of experience, they enable businesses to transition into future demands while preserving valuable business logic. They offer a suite of transformation, AI, and development tools.

Key Services:
Transformation solutions (Profound AppEvo, Profound Discovery)AI-enhanced futurization (Profound AI)Development tools (Profound AppDev)Integration services (Profound API)Staff augmentation and consulting
Content Quality:

excellent

Branding:

consistent

Technical Stack

Technologies:
WordPressElementorYoast SEOGoogle AnalyticsHubSpotFacebook PixelMonsterInsightsjQueryVimeo Player APIYouTube Iframe API
Frameworks:
ElementorJet EngineJet TabsJet Tricks
Platforms:
WordPress CMS
Performance:

moderate

Mobile:

excellent

Accessibility:

good

SEO:

good

Security Assessment

Security Score:
80/100
Best Practices:
  • HTTPS enforced
  • No exposed sensitive data in HTML
  • Use of security and analytics scripts with async loading

Analytics & Tracking

Services:
Google AnalyticsMonsterInsightsHubSpot AnalyticsHotjarLinkedIn Insight Tag
Tracking Level:extensive
Privacy Compliance:good

Advertising & Marketing

Ad Networks:
Facebook Ads
Tracking Pixels:
Facebook PixelHotjarLinkedIn Insight Tag
Marketing Tools:
HubSpotMonsterInsights
Transparency Level:good

Website Quality Assessment

Design Quality:excellent
User Experience:excellent
Content Relevance:excellent
Navigation Clarity:excellent
Professionalism:excellent
Trustworthiness:high

Key Observations

1

Website is fully accessible with rich content and professional design

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

30/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

80/100
Score

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Data Protection Officer mentioned

LOW

Large organizations may need to designate a DPO under GDPR

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

17/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

70/100
Score

DMARC not enforcing

MEDIUM

DMARC policy is set to "none"

No DMARC reporting

LOW

DMARC aggregate reports not configured

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:spf.protection.outlook.com include:notifybf1.hubspot.com include:1708946.spf06.hubspotemail.net -all
DNS Lookups:3/10
Policy:-all
DKIM Selectors Found
Selector:selector1(1296-bit rsa)
DMARC Details
Policy:none

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

77/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

75/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

Domain Delete Lock Not Enabled

LOW

Domain can be deleted without additional verification

DMARC Policy Set to None

LOW

DMARC is configured but not enforcing any policy

Domain Registration Details

Domain Age
25 years(mature)
Expiry Risk
none(2733 days)
Protection Level
basicDNSSEC OFF

DNS Records

A Records:3.17.0.191
Name Servers:
ns-1147.awsdns-15.org
ns-1614.awsdns-09.co.uk
ns-454.awsdns-56.com
ns-568.awsdns-07.net
MX Records:
0: profoundlogic-com.mail.protection.outlook.com
SOA:Serial: 1, TTL: 86400s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:40ms

SPF Analysis

SPF Record:
v=spf1 include:spf.protection.outlook.com include:notifybf1.hubspot.com include:1708946.spf06.hubspotemail.net -all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built on a modern WordPress platform using Elementor page builder and several Jet plugins, providing a flexible and visually appealing design. It integrates advanced analytics and marketing tools including Google Analytics, HubSpot, Facebook Pixel, Hotjar, and LinkedIn Insight Tag, enabling extensive user behavior tracking and marketing automation. The site is mobile-optimized, accessible, and SEO-friendly with proper meta tags and structured data (JSON-LD). Performance is moderate, with asynchronous loading of scripts to reduce blocking. The technical stack is well-suited for a B2B technology marketing site but could be improved by optimizing hosting details and implementing advanced security headers. No critical technical debt or vulnerabilities were detected in the visible content.
Analyze Another Website