Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
RISKREX - Test our digital risk management platform
Consulting

RISKREX - Test our digital risk management platform

Modern crime is increasingly shifting the Internet and hits companies of all sizes and industries. Digital Risk Management displays the attack potential.

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: October 7, 2024 2 min read read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)

TL;DR

RISKREX is AWARE7's digital risk management platform that scans a company's domain using over 250 sources to assess both technical and human attack vectors, including exposed credentials, misconfigured email servers, cloud storage, and internal documents found publicly. The black-box analysis requires no prior knowledge, mimicking real attacker reconnaissance. Results highlight critical vulnerabilities and human-factor risks with actionable recommendations. A freemium version was made available from January 15, 2020, allowing companies to run an initial assessment at no cost.

Table of Contents (4 sections)

Modern crime is increasingly shifting to the Internet and hits companies of all sizes and industries with full force - a modern digital risk management tool helps to recognize the attack potential of your company at an early stage, to check suppliers and to close and reduce security gaps on a technical and human basis in a traceable manner.

Over 250 sources are tapped for Digital Risk Management

What can criminals see? What data is available from the company? Are there critical security gaps? What can be done to position the company well against cyber attacks? All these questions are answered by our digital risk management platform RISKREX. At regular intervals, you will find the latest information here. RISKREX does not just focus on technical features. The analysis also includes the examination of human factors.

Often the human factor is the door opener - with RISKREX you handle this

The organization chart is rarely revealed. Documents intended for the intranet should stay there. However, there are costly ways to reliably collect this information. With RISKREX, you can save yourself a significant amount of analysis, up to and including complete automation. We present your human attack potential to you. Take advantage of our recommendations for action and then reduce your human and technical attack potential.

The first analysis with RISKREX is free of charge and can be used by anyone!

The analysis is based on the domain in the first step. As usual for attackers, we automatically start the analysis without any prior knowledge - similar to a black box investigation. After a short time you will receive the first results of the analysis. The next step is to view and evaluate the results. You should maintain close contact with your IT department. Critical security gaps should be closed, if possible without affecting the production system. E-mail servers and even hosted cloud storage are among the most popular areas for analysis.

Digital Risk Management - try RISKREX now for free!

Starting 15.01 you have the possibility to access the advanced technology by registering on our website. Since this is a freemium version, you can use and try the software at your leisure. We will be happy to help you explain it and help you get the most out of the software. For more information, see Digital Risk Management and RISKREX.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAV