Distr@L Funding Accelerates Development of New LocateRisk Security Technology
An accessible cyber security solution for all companies. This is what we have set ourselves as our goal with LR-Cont. Thanks to the funding of 160,000 euros from the "Distr@l - Strengthening Digitization, Living Transfer" program of the state of Hesse, we can develop new security technologies to enable companies to protect their external attack surface even more efficiently.
What is LR-Cont?
With LR-Cont, complex cybersecurity processes in an application are monitored and can be effectively eliminated. The basis was a software project that aimed to analyze cyber risks for organizations of all types and sizes.
Who Benefits from the Technology?
Cyber attacks hit companies of all types and sizes every day. This flood of attacks can hardly be contained without continuous monitoring of the external attack surface. Digital Minister Prof. Dr. Kristina Sinemus summarizes how LR-Cont remedies the situation: "The application is a big step towards protecting complex IT infrastructures from automated attacks, for example. This offers progress in the fight for more IT security, especially for startups, SMEs or the public sector."
A Funding for Innovation and Further Development
Distr@l funds research and development projects that significantly raise the state of the art so that challenges of the digital transformation in business and society can be met consciously and in a target group-oriented manner with four funding lines.
We are pleased that the explosive nature of cyber attacks is being noticed and solutions are being promoted. "With the help of Distr@l funding, we can develop technologies that enable all responsible parties to have a continuous security routine according to high standards. This reduces the risks of cyber incidents and saves resources in areas such as IT, risk management and purchasing," says Lukas Baumann, founder and CEO of LocateRisk.
Click here for the press release of the Hessian Minister for Digital Strategy and Development.
Request your personal Live-Demo now
Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.
Learn more, book a demo, or just have a quick chat? Alex is happy to help!
Your personal consultant AlexanderFeldmann Consulting
Technical storage or access is strictly necessary for the lawful purpose of enabling the use of a particular service expressly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a message over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that have not been requested by the subscriber or user.
The technical storage or access, which is carried out exclusively for statistical purposes.Technical storage or access used solely for anonymous statistical purposes. Without a subpoena, the voluntary consent of your Internet service provider, or additional records from third parties, information stored or accessed for this purpose alone generally cannot be used to identify you.
Technical storage or access is necessary to create user profiles, to send advertisements, or to track the user on a website or across multiple websites for similar marketing purposes.