future-oriented cloud computing solutions

IKARUS cloud.security

Available immediately and at any time: With the Managed Security Services from IKARUS cloud.security you can save yourself time-and costly consuming hardware purchases as well as technical knowledge. We protect your e-mail and web gateways, Wi-Fi hotspots and all devices – from PCs to laptops and smartphones. Malware, data thieves and unwanted intruders do not stand a chance.

IKARUS anti.virus in the cloud

Central Antivirus-Management in the Cloud

IKARUS anti.virus


  • Web-based management console to manage clients, software and licences
  • Proactive and reactive malware detection with a multidimensional process, behavioural analysis and exploit detection
  • Malware scans directly on the computer; no data transmitted to the cloud
  • Virus warnings and flexible notifications of defined events
  • Antispam feature for Microsoft Outlook, including individual blacklists and whitelists
  • Continuous system monitoring and regular incremental updates
  • Monitoring of all uploads and downloads in Microsoft SharePoint to identify potential threats

More information…

IKARUS mobile.management

Mobility solutions for corporate environments

IKARUS mobile.management

IKARUS mobile.management is a comprehensive solution for private and mobile devices in corporate environments.

  • Protection against infections, data loss and unauthorized access
  • Simple and scalable implementation of company policies even on private devices
  • Management and overview of inventory and database
  • EU GDPR-compliant and TÜV-certified

More information…

IKARUS mail.security

Email security with ATP option

IKARUS mail.security

IKARUS mail.security with ATP scans emails and attachments, detects and blocks malware, spam and zero day attacks, even before they reach the network.

  • Real-time protection against the latest virus and spam outbreaks
  • Highly professional multi-level antispam concept
  • Behaviour-based analyses using own simulators
  • ATP add-on: additional signature-independent analysis with sandboxes

More information…

FireEye Mail Security

Cloud-based secure email gateway

FireEye Email Security

Strengthens the protection against targeted e-mail based cyber-attacks, by prioritizing important alerts and averting and containing security incidents on the basis of global detailed threat intelligence.

  • Blocks unauthorized access to your employees, data and resources
  • Protects against spear-phishing campaigns, attacks using false identities, unknown malware and SPAM
  • Individual classification thanks to in-house and e-mail specific threat intelligence
  • Accelerated countermeasures thanks to context information from incident response engagements

More information…

FireEye Endpoint Security

Stop the known, find the hidden and fix the breaches that matter


FireEye Endpoint Security combines the best of legacy security products, enhanced with FireEye technology, expertise and intelligence to defend against today’s cyber attacks. FireEye uses four engines in Endpoint Security to prevent, detect and respond to a threat.

Even with the best protection, breaches are inevitable. To ensure a substantive response that minimizes business disruption, Endpoint Security provides tools to:

  • Search for and investigate known and unknown threats on tens of thousands of endpoints in minutes
  • Identify and detail vectors an attack used to infiltrate an endpoint
  • Determine whether an attack occurred (and persists) on a specific endpoint and where it spread
  • Establish timeline and duration of endpoint compromises and follow the incident
  • Clearly identify which endpoints and systems need containment to prevent further compromise

More information…

FireEye Network Security

Effective protection against cyber breaches for midsize to large organizations

Logo FireEye Network Security

Detect threats others miss

  • Apply state of the art, signatureless detection and protection against the most advanced threats, including zero-days.
  • Combine heuristics, code analysis, statistical analysis, emulation, and machine learning in one advanced sandboxing solution.
  • Enhance detection efficacy with frontline intelligence derived on the frontlines of the world’s biggest breaches.

More information…

FireEye Helix

Take control of any incident from alert to fix

fireeye helix


  • Detect advanced threats: Integrate over 300 FireEye and non-FireEye security tools and overlay contextual threat intelligence, and behavioral analytics to deliver unparalleled situational awareness.
  • Minimize the impact of an incident: Accelerate response with security orchestration and workflow automation informed by frontline experience.
  • Gain visibility: Whether on premise or in the cloud, centralize security data and infrastructure with next-generation SIEM for complete visibility into threats and vulnerabilities.

More information…

Defense in Depth
Qlocker 01

Ransomware Qlocker: How to restore your data (for the most part)

Two Austrian security experts analyzed the method the hackers used and found out, that they made a mistake.
Beat The Best
Microsoft Exchange
*IKARUS quick survey (Q1 / 2021): Cybersecurity in times of corona