
Is rexx-recruitment.com Safe? Security Analysis for Rexx Systems
https://rexx-recruitment.comCheck if rexx-recruitment.com is a scam or legitimate. Free security scan and reviews.

AI Summary
Rexx Systems is a well-established German technology company specializing in HR software solutions tailored for medium and large enterprises. With over 25 years of experience and a customer base of approximately 3,000 clients, the company offers modular, cloud-based and on-premise HR software products including recruiting, talent management, digital personnel files, and AI-enhanced tools. Their market position is strong within the HR technology sector, supported by consistent branding and professional digital presence. Technically, the website is built on WordPress with Elementor and leverages modern web technologies such as jQuery and Google Tag Manager. The site is optimized for performance, mobile responsiveness, and SEO, reflecting a mature digital infrastructure. Security measures include HTTPS enforcement and standard security headers, although there is room for improvement in public vulnerability disclosure and incident response transparency. The security posture is solid with no evident vulnerabilities or exposed sensitive data. Privacy compliance is good, with comprehensive privacy and cookie policies and consent mechanisms in place. However, the absence of WHOIS registration data introduces some uncertainty regarding domain registration transparency, though this is likely due to privacy protection. Overall, Rexx Systems presents a trustworthy and professional business with a secure and well-implemented web presence. Strategic recommendations include enhancing security transparency through vulnerability disclosure and incident response information, and maintaining rigorous audits of third-party scripts and data retention policies.
Detected Technologies
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Business Intelligence
Market & Strategic Analysis
Rexx Systems operates in the competitive HR software market, targeting medium to large enterprises primarily in Germany but also internationally. Their modular software approach and integration of AI technologies provide competitive advantages. The business model is B2B SaaS and on-premise software sales, supported by a strong customer base and long market presence. The company leverages partnerships and digital marketing tools such as Leadinfo and Google Tag Manager to drive growth. Their website content and structured data indicate a focus on trust-building and professional service delivery, positioning them as a reliable vendor in the HR technology sector.
Extracted Contact Information
Marketing Intelligence Data
Email Addresses (1)
Phone Numbers (1)
Physical Addresses (1)
Security Posture Analysis
Comprehensive Security Assessment
The website demonstrates a mature security posture with HTTPS enforced and multiple security headers implemented. No sensitive data leakage or vulnerable libraries were detected in the HTML content. Privacy policies are comprehensive and GDPR compliant, including cookie consent mechanisms. However, the absence of a public vulnerability disclosure policy or security.txt file and lack of incident response contact details represent gaps in security transparency and readiness. These gaps could impact customer trust and compliance with emerging regulations such as NIS2. Overall, the security maturity is good but could be improved by formalizing vulnerability management and incident response communication.
Strategic Recommendations
Priority Actions for Security Improvement
Publish a public vulnerability disclosure policy or security.txt file to enhance transparency and trust.
✨Observations
AI-powered comprehensive website and business analysis.
AI-Enhanced Website Analysis
Business Insights
Rexx Systems
Rexx Systems provides HR software solutions including recruiting, talent management, and AI-driven tools, serving 3,000 customers mainly in medium-sized and large enterprises with cloud and on-premise options.
excellent
consistent
Technical Stack
fast
excellent
good
excellent
Security Assessment
- HTTPS enforced
- Content Security Policy present
- No exposed sensitive data in HTML
- Use of Google Tag Manager with deferred loading
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website is fully accessible with no blocking or WAF challenge.
🛡️Security Headers
HTTP security headers analysis and recommendations.
Security Headers
HTTP security headers analysis
Missing Strict-Transport-Security header
HIGHForces HTTPS connections
Missing X-Content-Type-Options header
MEDIUMPrevents MIME type sniffing
Missing Content-Security-Policy header
HIGHControls resources the browser is allowed to load
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended)
Missing Referrer-Policy header
LOWControls referrer information sent with requests
Missing Permissions-Policy header
MEDIUMControls browser features and APIs
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
GDPR Compliance
Privacy and data protection assessment
No Cookie Policy found
HIGHGDPR requires clear information about cookie usage
No Cookie Consent Banner found
HIGHGDPR requires explicit consent for non-essential cookies
No Data Protection Officer mentioned
LOWLarge organizations may need to designate a DPO under GDPR
Privacy policy may not be GDPR compliant
MEDIUMPrivacy policy lacks explicit GDPR compliance elements
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
NIS2 Compliance
Network & Information Security Directive
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity
No security contact information
HIGHNIS2 requires clear incident reporting channels
No vulnerability reporting mechanism
MEDIUMClear vulnerability reporting supports coordinated disclosure
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Email Security
SPF, DKIM, and DMARC validation
No DKIM record found
MEDIUMDKIM adds cryptographic signatures to emails
No BIMI Record
LOWBIMI displays brand logos in email clients
No MTA-STS Policy
MEDIUMMTA-STS enforces TLS for email delivery
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues
SPF Details
DMARC Details
🏆SSL/TLS Security
Certificate validity and encryption analysis.
SSL/TLS Security
Certificate validity and encryption analysis
Weak Protocols Supported
HIGHServer supports weak protocols: TLSv1.1
OCSP Stapling Not Enabled
LOWOCSP stapling improves performance and privacy
Certificate Transparency Not Implemented
LOWCertificate is not logged in Certificate Transparency logs
SSL Certificate Expires Within 90 Days
MEDIUMSSL certificate expires in 64 days
Weak SSL Key Length
HIGHSSL certificate uses 384-bit key, which is considered weak
Partial SSL/TLS Assessment
LOWCompleted 3 of 4 security checks due to time constraints
Protocol Support
OCSP Status
📊DNS Health
DNS configuration and security assessment.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain
Domain Delete Lock Not Enabled
LOWDomain can be deleted without additional verification
Domain Registration Details
DNS Records
DNSSEC Status
DNS Performance
SPF Analysis
⚡Network Security
Port scanning and network exposure analysis.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Technical Analysis
Comprehensive security assessment findings
Additional Findings
How did we do?
Your feedback directly shapes our roadmap. Rate the quality of this report, leave an optional comment, and let us know if you want our security specialists to follow up.
What others say about rexx-recruitment.com
Share your experience to help others make informed decisions. We verify every review by email and publish it once our moderation team approves it.
Community rating
—out of 5
0 reviews published