Intellix IT Solutions
Intellix CISO Cockpit · External Cybersecurity Audit

Find out what attackers see — before they do.

A free, non-intrusive 3–5 page external security review for your domain — delivered in 7 working days. Three priority observations + the controls already working in your favour. When you're ready to act: fixed-price remediation from €950, vendor coordination from €1,750, monthly monitoring from €350.

15+ live clients GDPR Art. 32 mapped MITRE ATT&CK referenced NIS2 scorecard available
Intellix CISO Cockpit
Cybersecurity Audit · Free Brief
Non-Intrusive External Review
yourcompany.ie
Type
Public surface
Date
2026-XX-XX
Prepared by
Asif Khan
Classification
Confidential
Findings at a Glance
01B2B subdomain redirect chainValidate
02API config endpoint exposureValidate
03Storefront CORS policyValidate
04DMARC enforcement (p=reject)Strong
05DNSSEC + Cloudflare WAFStrong
06HSTS preload (active)Strong
Mapped to GDPR Art. 32 · NIS2 · MITRE ATT&CK · CVSS v3.1
€0
Free initial review
€950
Fix pack · from
€1,750
Vendor handled · from
€350/mo
Monitoring · from
15+
Live clients tracked
The Tuesday-morning question

"What should I worry about, what should I leave alone, and who do I phone?"

If you're a CISO, IT Manager or Head of Operations, that's the actual question. Not "how many CVEs do we have?" — your scanner already screams that at you. Not "can we pass a pen test?" — you'll book one when there's budget. The thing that keeps you up is whether the next BEC email gets through, whether your DNS is leaking a takeover-able subdomain, and whether someone can credibly send mail as your domain right now.

The Intellix CISO Cockpit is built around that question. The tooling runs in minutes. The analyst review takes hours, not weeks. Every finding is tagged to a single named owner — your platform vendor, your Microsoft 365 partner, your DNS registrar, your in-house developer — so the IT lead can forward each section without rewriting it.

Coverage matrix

Six layers. Every public surface. Every audit.

We scan the same six layers on every client. Findings land in the matrix below — each tagged with severity, confidence, owner and remediation steps in the paid pack. Layer six is the one most scanners skip and most attackers exploit first.

01

DNS & Domain Hygiene

  • ·DNSSEC + chain of trust
  • ·CAA pinning
  • ·40+ subdomain patterns probed
  • ·Stale / takeover-risk subdomains
  • ·Lookalike & typo-squat sweep
  • ·SOA freshness · zone hygiene

Why it mattersCatches dead subdomains pointing at orphaned IPs, ungrabbed lookalike domains, and registrar gaps.

02

Email Authentication & Impersonation

  • ·SPF mechanism analysis
  • ·DKIM (12+ selector probe)
  • ·DMARC policy + alignment + pct
  • ·MTA-STS / TLS-RPT / BIMI
  • ·Null-MX (RFC 7505)
  • ·Display-name BEC readiness

Why it mattersThe layer that catches the "Sarah-from-Accounts" lookalike-email attack before it lands in finance.

03

Transport Security (TLS)

  • ·TLS 1.0/1.1/1.2/1.3 matrix
  • ·Cipher suite + AEAD inventory
  • ·Cert chain · SAN · key type
  • ·HTTP → HTTPS redirect inspection
  • ·HSTS · max-age · preload status
  • ·HTTP/2 & QUIC advertisement

Why it mattersCloses the first-visit MITM window and stops a single expired cert taking down a whole subdomain estate.

04

HTTP Response Headers

  • ·CSP, X-Frame, frame-ancestors
  • ·Referrer-Policy, Permissions-Policy
  • ·Cross-Origin Opener / Embedder
  • ·Deprecated headers flagged
  • ·Conflict & duplication detection
  • ·Per-cookie Secure / HttpOnly / SameSite

Why it mattersCatches the silent breakage that happens when Caddy, FastAPI and Cloudflare each add a different CSP header.

05

Application Surface (per-platform)

  • ·WordPress · xmlrpc · wp-json · /?author
  • ·WooCommerce · Bookings · payment scope
  • ·Shopware 6 · API & origin leakage
  • ·Microsoft Power Pages · Dataverse probe
  • ·Generic SPA / API · health · CORS
  • ·SRI coverage + inline-script footprint

Why it mattersPlatform-specific knowledge — not a generic scanner pretending all stacks look the same.

06

Business-Context Layer

  • ·BEC / display-name impersonation playbook
  • ·Incident-response & abuse-report wording
  • ·Vendor-validation questions ready to forward
  • ·Owner-mapping per finding
  • ·GDPR Art. 32 + NIS2 mapping
  • ·MITRE ATT&CK technique tags

Why it mattersThe layer most scanners skip. Turns a vulnerability list into something an IT Manager can actually action.

Findings are mapped against
GDPR Art. 32 NIS2 control families MITRE ATT&CK CVSS v3.1 CWE ISO 27001 alignment
Five tiers · One pathway

Start free. Step up when you're ready to act.

Every engagement starts with the free brief. From there, you choose whether you want a fix-list your team can action, or a partner who closes it with your vendor for you. Recurring monitoring and full managed cybersecurity oversight available for clients who want continuous coverage.

Tier 01 · Complimentary · No commitment

Initial External Review

Know what attackers see — in 7 working days, on you.

  • 3 to 5 priority observations — what's worth fixing first
  • Positive controls included — the things already protecting you
  • Public surface only · No exploitation · No login attempts · No private data accessed
  • Plain English. No fear-selling. No pricing pitch inside the PDF.
  • One free brief per organisation. Delivered to your inbox.
Free
3–5 page IT-Manager brief
Show me what's exposed
No credit card · No NDA needed · Delivered to your inbox
Tier 02 · One-off

Technical Remediation Pack

Hand your team a fix list they can action this sprint.

€950 – €1,250
One-off · fixed price · scoped before start
  • Full per-finding evidence — request/response, DNS record, headless-browser screenshot
  • Confidence rating: Confirmed vs Requires Validation (nothing exaggerated)
  • Vendor-validation questions ready to forward verbatim
  • Owner mapping — every finding tagged to who fixes it
  • 0 to 30-day remediation roadmap, colour-coded
  • One 30-min review call after delivery
  • One retest of priority fixes — verifies the change actually landed

Designed to be handed directly to your IT team or platform vendor as an action document.

Most popular
Tier 03 · One-off · Hands-off

Remediation Pack + Vendor Coordination

We close it with your vendor. You sign off the closure note.

€1,750 – €2,500
One-off · vendor handling included
  • Everything in Tier 02 (full evidence, owner mapping, roadmap, retest)
  • We email and call your vendor directly — Microsoft 365 partner, DNS registrar, hosting, in-house dev
  • We handle the back-and-forth — vendor questions, escalations, ETAs
  • Follow-up questions answered for 30 days after delivery
  • Final retest + signed closure note for your insurer / board / auditor
  • Saves your IT lead 8–15 hours of vendor-chasing per finding

Best for: companies where the IT Manager has 11 other priorities and just wants this closed.

Tier 04 · Recurring

External Exposure Monitoring

Catch the next problem before it bites — not six months after.

€350 – €950 / month
Monthly retainer · cancel anytime · annual discount
  • Monthly or quarterly public-surface re-scan
  • DNS, email-auth and domain monitoring — alerted on change
  • Vendor change-detection — your Shopify / Shopware / M365 stack
  • Phishing & lookalike-domain monitoring — registrar sweep + alerts
  • Monthly management summary — board-ready, one page
  • Direct line to the analyst running your scans

Most clients move here after their first Remediation Pack — continuous coverage at <10% of consultancy retainer cost.

Tier 05 · For regulated estates

Managed IT & Cybersecurity Oversight

One trusted partner across your full estate. Calm again on Monday.

Scoped to estate
From €1,800 / month · annual contract
  • Microsoft 365 security hardening + ongoing review
  • Firewall review + change management
  • WiFi revamp — guest network + segmentation done properly
  • Backup & ransomware readiness — tested, not just configured
  • Vendor coordination — single point of contact for your IT stack
  • Guest-data / customer-data protection support (hotels, retail, clinics)
  • Optional: full managed IT maintenance contract

Strongest fit: hotels, ecommerce brands, food producers, equine businesses, medical clinics, luxury retail.

Strongest fit — businesses where downtime, trust and data matter most
Hotels & hospitalityEcommerce brandsFood producersEquine businessesLuxury retailMedical clinicsProfessional servicesLogistics firmsB2B portal manufacturers

Our wedge: hospitality, ecommerce and food production systems. That's where our credibility runs deepest — Cashel Blue, Shawarma, Umi Falafel, Capital Stud and 15+ live cybersecurity clients across Ireland and the UK.

How the scan runs

Three evidence layers. Zero disruption.

Everything we do generates traffic your browser, a search-engine crawler or a legitimate integration would already make. The strict no-go list is on the cover of every PDF.

01
Passive reconnaissance

Read-only DNS lookups, HTTP HEAD / OPTIONS, TLS handshake inspection. Zero traffic that any normal browser, search-engine crawler or partner integration wouldn't already generate.

02
Headless-browser evidence

Chromium under Playwright loads the page, captures full screenshots, inspects the cookie jar, walks the redirect chain, and harvests rendered HTML for things server-side requests miss.

03
Analyst review

Every machine finding is hand-graded by an analyst for severity, confidence (Confirmed vs Requires Validation), business impact and owner. Nothing reaches a client report without a human reading it.

What this review IS
  • · External, public-surface review only
  • · Read-only HTTP and DNS
  • · Permission-based and uniformly applied
  • · Evidence captured in your report (headers, redirect chains, DNS records, screenshots)
  • · Findings prioritised: validate-first vs best-practice hardening
  • · Confirmation of the strengths already in place
What this review is NOT
  • · No login attempts or password testing
  • · No fuzzing, scanning of admin paths, or input injection
  • · No exploitation of any finding
  • · No access to private data, customer records or internal systems
  • · No aggressive or rate-limited scanning
  • · Nothing that could disrupt service for real users
Compared to

Between the scanner that screams and the consultancy that takes six months.

Most external security reviews do one of two things and stop. Pure-tooling scanners generate hundreds of low-context machine findings that need a security engineer to translate. Pure-consulting reports are good but take 4–8 weeks, cost €15–50k, and are stale the day they ship. The CISO Cockpit sits between the two.

Pure-tooling scannerBig-4 consultancyIntellix CISO Cockpit
Time to first reportMinutes — but unreadable for an IT Manager4–8 weeksFree Brief in 0–48 working hours
Cost€500–5k/yr subscription · no analyst€15–50k one-offFree Brief at €0 · Paid Pack scoped & fixed before start
Finding contextHundreds of CVEs · no owner · no priorityDeep but genericEvery finding tagged to a named owner with copy-and-forward wording
ToneAlarmist · severity-inflatedAuthoritative · slowCalm · evidence-led · &quot;worth confirming with your vendor&quot;
Vendor handoffNot includedSometimesVendor-ready Remediation Pack designed to be forwarded verbatim
Compliance mappingBolt-on add-onIncluded if scopedGDPR Art. 32 + NIS2 + MITRE ATT&CK + CVSS + CWE in every paid pack
Re-scan costSubscription locked inAnother engagementOne-command re-run · retainer available for quarterly
What this means for your organisation

Three hours of our time. Three months of your engineers' priorities, sorted.

0–48 hrs
Turnaround

Most Free Briefs go back within 48 working hours of confirmed scope. Larger estates: a week.

2–6
Priority items, on average

Enough to action quickly. Few enough that nothing falls through the cracks on a busy week.

100%
Service uptime during the review

By design — nothing we do touches your live transactions, sessions, or admin surfaces.

EU / IE
Data jurisdiction

Reports and any temporary working copies stay within EU storage. Findings are never shared outside your organisation without written instruction.

Request your Free Brief

One form. One domain. One report.

Tell us the domain, where to send the PDF, and we'll confirm scope within one working day. We treat your enquiry confidentially — same as everything else we do.

  • No marketing follow-up unless you ask for it.
  • One Free Brief per organisation. Additional domains at our discretion.
  • You own the report. Share with your board, insurer, vendor, or auditor.
  • No credit card. No NDA needed for the initial summary.
Confidential. EU data jurisdiction.
Common questions

What CISOs and IT Managers ask us first.

If we haven't answered yours, the form above goes straight to the analyst running the scans — not a sales inbox.