Is rtbhouse.com Safe? Security Analysis for RTB House
Check if rtbhouse.com is a scam or legitimate. Free security scan and reviews.

AI Summary
RTB House is a technology company specializing in next-generation performance advertising powered by deep learning. Their platform focuses on first-party data to deliver personalized marketing campaigns that drive growth across web and app channels. The company positions itself as a leader in the performance DSP market, offering services such as retargeting, acquisition, engagement, and demand generation. The website demonstrates a strong brand presence with client testimonials, case studies, and a comprehensive privacy and cookie consent framework. Technically, the website is built on modern frameworks including Next.js and React, integrates with marketing and analytics tools like HubSpot, Google Tag Manager, and Fathom Analytics, and uses DatoCMS for content management. The site is well-optimized for performance, mobile responsiveness, and SEO, providing an excellent user experience. From a security perspective, the site enforces HTTPS and includes cookie consent mechanisms aligned with GDPR compliance. However, explicit security headers are not detected, and no public security policy or incident response information is available. The WHOIS data for the domain is not publicly available, which slightly reduces trust but does not contradict the legitimacy indicated by the website content and branding. Overall, RTB House presents a professional and trustworthy digital presence with strong technical and privacy compliance maturity. Strategic improvements in security transparency and direct contact information could further enhance trust and security posture.
Detected Technologies
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Business Intelligence
Market & Strategic Analysis
RTB House operates in the technology sector, specifically in digital advertising and marketing technology. Their business model revolves around leveraging deep learning to enhance performance advertising using first-party data. The company targets advertisers, marketers, and agencies seeking advanced retargeting and acquisition solutions. Their market position is that of an innovative DSP provider with a focus on AI-driven personalization. Revenue streams likely include advertising campaign management fees and technology licensing. The presence of global case studies and client testimonials indicates a broad international footprint and a mature partnership ecosystem. The company emphasizes data privacy and compliance, which is critical in their industry. Strategic observations include the importance of maintaining transparency in domain registration and enhancing security disclosures to align with industry best practices.
Security Posture Analysis
Comprehensive Security Assessment
The website demonstrates a moderate to strong security posture with HTTPS enforced and a cookie consent mechanism that supports GDPR compliance. The absence of explicit security headers such as Content Security Policy (CSP), HTTP Strict Transport Security (HSTS), and X-Frame-Options represents an area for improvement. No vulnerabilities or exposed sensitive data were detected in the content. The lack of published security policies, incident response procedures, or vulnerability disclosure programs suggests limited transparency in security governance. The WHOIS data absence is a minor concern but does not indicate malicious intent. Overall, the security maturity is adequate for a technology company but could be enhanced by adopting additional security best practices and publishing relevant policies.
Strategic Recommendations
Priority Actions for Security Improvement
Implement and publish comprehensive security headers including CSP, HSTS, and X-Frame-Options to enhance protection against common web attacks.
✨Observations
AI-powered comprehensive website and business analysis.
AI-Enhanced Website Analysis
Business Insights
RTB House
Create truly personalized marketing campaigns powered by Deep Learning technology that cut through the online noise. 100% ready for the cookieless world.
excellent
consistent
Technical Stack
fast
excellent
good
good
Security Assessment
- HTTPS enforced
- Cookie consent mechanism
- Privacy policy compliance
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website is fully accessible with rich content and multimedia
🛡️Security Headers
HTTP security headers analysis and recommendations.
Security Headers
HTTP security headers analysis
Missing Strict-Transport-Security header
HIGHForces HTTPS connections
Missing X-Frame-Options header
HIGHPrevents clickjacking attacks
Missing X-Content-Type-Options header
MEDIUMPrevents MIME type sniffing
Missing Content-Security-Policy header
HIGHControls resources the browser is allowed to load
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended)
Missing Referrer-Policy header
LOWControls referrer information sent with requests
Missing Permissions-Policy header
MEDIUMControls browser features and APIs
Sensitive data may be cached
LOWCache-Control header should include "no-store" for sensitive pages
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
GDPR Compliance
Privacy and data protection assessment
No Cookie Policy found
HIGHGDPR requires clear information about cookie usage
No Data Protection Officer mentioned
LOWLarge organizations may need to designate a DPO under GDPR
Privacy policy may not be GDPR compliant
MEDIUMPrivacy policy lacks explicit GDPR compliance elements
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
NIS2 Compliance
Network & Information Security Directive
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity
No security contact information
HIGHNIS2 requires clear incident reporting channels
No vulnerability reporting mechanism
MEDIUMClear vulnerability reporting supports coordinated disclosure
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Email Security
SPF, DKIM, and DMARC validation
Weak DKIM Key
HIGHDKIM selector 'google' uses 744-bit key
No BIMI Record
LOWBIMI displays brand logos in email clients
No MTA-STS Policy
MEDIUMMTA-STS enforces TLS for email delivery
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues
SPF Details
DKIM Selectors Found
DMARC Details
🏆SSL/TLS Security
Certificate validity and encryption analysis.
SSL/TLS Security
Certificate validity and encryption analysis
Weak Protocols Supported
HIGHServer supports weak protocols: TLSv1.1
OCSP Stapling Not Enabled
LOWOCSP stapling improves performance and privacy
Certificate Transparency Not Implemented
LOWCertificate is not logged in Certificate Transparency logs
SSL Certificate Expires Within 90 Days
MEDIUMSSL certificate expires in 56 days
Partial SSL/TLS Assessment
LOWCompleted 3 of 4 security checks due to time constraints
Protocol Support
OCSP Status
📊DNS Health
DNS configuration and security assessment.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain
CAA Records Not Configured
LOWCertificate Authority Authorization (CAA) records not found
Domain Registration Details
DNS Records
DNSSEC Status
DNS Performance
SPF Analysis
⚡Network Security
Port scanning and network exposure analysis.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Technical Analysis
Comprehensive security assessment findings