Skip to main content

Is speedkom.info a Scam? Security Check Results - ID.KOM Reviews

speedkom.info favicon

Is speedkom.info Safe? Security Analysis for ID.KOM

https://speedkom.info

Check if speedkom.info is a scam or legitimate. Free security scan and reviews.

TechnologyGermanymedium
WordPressDivi ThemeGravity FormsjQueryOwl Carousel+4 more
Analyzed 10/10/2025Completed 12:12:56 PM
65
Security Score
MEDIUM RISK
Exclusive insights unlocked

Unlock the complete security report for speedkom.info

Get full access to AI recommendations, compliance evidence, vulnerability remediation steps, and downloadable PDF reports. Upgrade once for lifetime access to this scan.

Full Report Access

All modules, AI insights, PDF download

39.90 €one-time • Incl. 21% VAT

Marketing Intelligence

Contact emails, phone numbers & warm leads

49.90 €one-time • Incl. 21% VAT

How it works

  1. Enter your email to receive the unlocked report.
  2. Complete the secure EveryPay checkout (cards & local methods supported).
  3. You’ll receive an email with your unique unlock code and the PDF export.

Already purchased?

Order summary

Domainspeedkom.info
Access tierFull report or marketing add-on

Digital reports are delivered immediately after payment. By continuing you acknowledge the withdrawal waiver described in our Returns & Refunds policy.

VisaMastercardApple PayGoogle Pay

Secure payments processed via EveryPay. Prices in EUR; Incl. 21% VAT.

SEQ SIA

Lastadijas 12 k-3, Riga, Latvia, LV-1050

Reg. No. 40203410806 • VAT LV40203410806

Support: guard@offseq.com+371 2256 5353

AI Summary

ID.KOM is a well-established IT service provider based in Germany with over 30 years of experience specializing in IT outsourcing, cloud services, managed hosting, telecommunications, and IT security. The company targets… Unlock the full Guard report to read the complete analysis.

Detected Technologies

WordPressDivi ThemeGravity FormsjQueryOwl CarouselBorlabs CookieGoogle Tag ManagerTippy.jsPopper.js

Security Headers

7 findings

30/100

GDPR Compliance

3 findings

48/100

NIS2 Compliance

6 findings

30/100

Email Security

2 findings

83/100

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Snapshot shown below. Unlock the full AI report for complete market insights, audience profiling, and step-by-step recommendations.

Business Intelligence

Market & Strategic Analysis

ID.KOM holds a strong regional market position as a trusted IT partner for the German Mittelstand, leveraging its own data centers and certifications to differentiate from competitors. Their business model focuses on managed IT services, cloud hosting, and telecommunications, generating revenue through service contracts and support offerings. The company benefits from its affiliation with the Connexta group, expanding its reach and resources. The website indicates active engagement with customers via multiple contact forms and configurators, suggesting a customer-centric approach. Partnerships with technology vendors like Microsoft and VMware enhance their solution portfolio. Growth indicators include recent awards and continuous content updates, reflecting an active marketing and sales strategy.

Extracted Contact Information

Marketing Intelligence Data

Security Posture Analysis

Comprehensive Security Assessment

The security posture of ID.KOM is robust, supported by ISO 27001 certification and secure hosting infrastructure. The website enforces HTTPS and implements key security headers, reducing common web vulnerabilities. Use of Borlabs Cookie ensures GDPR-compliant cookie consent management. No exposed sensitive data or vulnerable libraries were detected in the site content. However, the absence of a public vulnerability disclosure policy and incident response contact limits transparency and may delay external reporting of security issues. The company should consider publishing a security.txt file and providing dedicated security contact channels to improve incident handling and trust. Overall, the security maturity is high for a medium-sized IT service provider.

Strategic Recommendations

Priority Actions for Security Improvement

1

Upgrade to the full Guard report to access tailored remediation steps.

Observations

AI-powered comprehensive website and business analysis.

A preview of your strategic observations is visible. Upgrade to unlock the full competitive positioning, trust signals, and branding checklist.

AI-Enhanced Website Analysis

Business Insights

Company:

ID.KOM

Description:

30 Jahre Erfahrung im Bereich professioneller Informations- und Telekommunikationstechnik. IT-Systemhaus & IT-Services für den Mittelstand mit eigenem Rechenzentrum und ISO 27001 Zertifizierung.

Key Services:
IT-OutsourcingManaged Server & HousingAccess | VPNDomain | Hosting | ZertifikateM365 BackupHosted ExchangeHosted Mail ArchivManaged Cloud BackupIT-SecurityDatenschutz
Content Quality:

good

Branding:

consistent

Technical Stack

Technologies:
WordPressDivi ThemeGravity FormsjQueryOwl CarouselBorlabs CookieGoogle Tag ManagerTippy.jsPopper.js
Frameworks:
DiviGravity Forms
Platforms:
WordPress
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • ISO 27001 certified data center
  • Use of security plugins (Borlabs Cookie)
  • Consent management for cookies
  • No exposed sensitive data detected

Analytics & Tracking

Services:
Google Tag Manager
Tracking Level:moderate
Privacy Compliance:good

Advertising & Marketing

Marketing Tools:
Rank Math PRO SEOBorlabs Cookie
Transparency Level:good

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:good
Navigation Clarity:good
Professionalism:good
Trustworthiness:high

Key Observations

1

Website is professionally designed and well-structured.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Some header findings are shown. Unlock to see the full checklist, impacted endpoints, and remediation guidance.

Security Headers

HTTP security headers analysis

30/100
Score

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks Unlock the full report to read the complete fix.

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing Unlock the full report to read the complete fix.

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load Unlock the full report to read the complete fix.

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended) Unlock the full report to read the complete fix.

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests Unlock the full report to read the complete fix.

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs Unlock the full report to read the complete fix.

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages Unlock the full report to read the complete fix.

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

Preview of GDPR checkpoints is visible. Unlock to reveal full evidence, policy excerpts, and DPIA guidance.

GDPR Compliance

Privacy and data protection assessment

48/100
Score

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage Unlock the full report to read the complete fix.

Privacy policy may not be GDPR compliant

MEDIUM

Privacy policy lacks explicit GDPR compliance elements Unlock the full report to read the complete fix.

EU business without adequate privacy measures

CRITICAL

EU businesses are subject to strict GDPR requirements Unlock the full report to read the complete fix.

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
emailphoneform

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

You can see headline NIS2 checks. Upgrade to access the full control mapping, severity breakdown, and remediation plan.

NIS2 Compliance

Network & Information Security Directive

30/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures Unlock the full report to read the complete fix.

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure Unlock the full report to read the complete fix.

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management Unlock the full report to read the complete fix.

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans Unlock the full report to read the complete fix.

No security contact information

HIGH

NIS2 requires clear incident reporting channels Unlock the full report to read the complete fix.

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure Unlock the full report to read the complete fix.

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Quick view of email authentication checks is provided. Unlock to uncover full DNS evidence, record diffs, and fix scripts.

Email Security

SPF, DKIM, and DMARC validation

83/100
Score

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails Unlock the full report to read the complete fix.

No BIMI Record

LOW

BIMI displays brand logos in email clients Unlock the full report to read the complete fix.

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:local-policy-restr.spf.speedkom.net include:datevnet._spf.datev.de ip4:20.93.203.168/32 ip4:66.180.82.0/24 ip4:212.123.36.0/24 ip4:194.25.225.215/24 -all
DNS Lookups:2/10
Policy:-all
DMARC Details
Policy:reject
Aggregate Reports:dmarc-reporting@idkom.de
MTA-STS Details
Mode:enforce
Max Age:7 days

🏆SSL/TLS Security

Certificate validity and encryption analysis.

This is a teaser of the TLS audit. Unlock to view certificate chains, cipher support tables, and remediation steps.

SSL/TLS Security

Certificate validity and encryption analysis

70/100
Score

Weak SSL Key Length

HIGH

SSL certificate uses 384-bit key, which is considered weak Unlock the full report to read the complete fix.

Mixed Content Detected

MEDIUM

3 resources loaded over insecure HTTP Unlock the full report to read the complete fix.

Partial SSL/TLS Assessment

LOW

Completed 2 of 4 security checks due to time constraints Unlock the full report to read the complete fix.

Certificate Details

Subject:*.idkom.de
Issuer:Sectigo ECC Domain Validation Secure Server CA
Valid Until:2/6/2026 (119 days)
SANs:*.idkom.de, idkom.de

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

Unlock the full DNS posture audit to reveal misconfigurations, zone records, and actionable fixes.

DNS Health

DNS configuration and security assessment

75/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain Unlock the full report to read the complete fix.

Domain Transfer Lock Not Enabled

MEDIUM

Domain can be transferred without authorization Unlock the full report to read the complete fix.

Domain Delete Lock Not Enabled

LOW

Domain can be deleted without additional verification Unlock the full report to read the complete fix.

Domain Registration Details

Protection Level
none
Suspicious Indicators Detected
  • No domain protection locks enabled

DNS Records

A Records:213.182.17.132
AAAA Records:2001:14e0:0:6::f
Name Servers:
ns1.dns.speedkom.net
ns2.dns.speedkom.net
ns3.dns.speedkom.de
ns4.dns.speedkom.info
MX Records:
300: mailin5.mx.speedkom.net
200: mailin2.mx.speedkom.net
SOA:Serial: 1759820702, TTL: 3600s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:72ms

SPF Analysis

SPF Record:
v=spf1 include:local-policy-restr.spf.speedkom.net include:datevnet._spf.datev.de ip4:20.93.203.168/32 ip4:66.180.82.0/24 ip4:212.123.36.0/24 ip4:194.25.225.215/24 -all

Network Security

Port scanning and network exposure analysis.

See a glimpse of exposed services. Unlock to access full port inventories, CVE lookups, and mitigation priorities.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports Unlock the full report to read the complete fix.

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Unlock to view the complete technical breakdown, stack fingerprinting, and hardening checklist.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

Unlock the full Guard report to review the complete technical breakdown and AI recommendations.
⭐ Verified Community Reviews

What others say about speedkom.info

Share your experience to help others make informed decisions. We verify every review by email and publish it once our moderation team approves it.

Overall rating
Select a rating
4000 characters remaining

We’ll email you to confirm your review and keep your details private.

Community rating

out of 5

0 reviews published

Loading reviews…

How did we do?

Your feedback directly shapes our roadmap. Rate the quality of this report, leave an optional comment, and let us know if you want our security specialists to follow up.

Overall report quality
Select a rating
2000 characters remaining

We only use your feedback to improve Guard reports. Contact details are never shared.

Analyze Another Website