Your IT security partner

IT security that actually works.

Automatis GmbH protects your infrastructure around the clock – with modern monitoring and security solutions that remain easy to understand, even in complex environments.

CIS-compliant security
24/7 real-time monitoring
Swiss quality standards
Automated remediation

What we do for you

From initial consultation to ongoing operations – we accompany you on the path to a secure and stable IT environment.

System monitoring

We monitor your servers, networks and applications around the clock. If a system fails or comes under stress, we see it immediately – often before you notice. You can focus on your business while we keep an eye on the technology.

Security monitoring

Attacks happen quietly and often unnoticed. Our security monitoring continuously analyses all events in your IT infrastructure and detects suspicious patterns – exactly like a security guard, but for your data.

IT security consulting

What is your biggest security gap? We analyse your environment neutrally and honestly, explain risks in plain language and show which measures actually make a difference.

IT infrastructure audit

Do you know what is really running on your network? An audit brings clarity: we check all systems, document vulnerabilities and deliver a prioritised action plan you can implement straight away.

Active Directory audit

User accounts, permissions and groups in Active Directory often grow uncontrolled over the years. We analyse who has access to what, find dormant accounts and help you keep your permission structure clean.

IT automation

Running recurring tasks like software updates, configuration changes or security patches manually is time-consuming and error-prone. We automate these processes so they run reliably, reproducibly and with full documentation.

AI applications & agents

Artificial intelligence is changing the way companies work. We help you understand where AI actually adds value in your business – and where it doesn't. From simple assistants to autonomous agents that handle tasks independently: we advise you pragmatically, securely and without the hype.

Our flagship product

SentryIQ – your digital security guard

The integrated monitoring and security platform by Automatis GmbH. SentryIQ combines classic security monitoring (SIEM), endpoint protection (EDR) and extended threat analysis (XDR) in one solution – with automatic response to incidents.

One platform · three layers of protection

SIEM Security Information & Event Management

Collects events from all your systems, correlates them and detects anomalies. Like a central control room that knows what's happening everywhere.

EDR Endpoint Detection & Response

Monitors every individual computer and server for suspicious behaviour – and can isolate an affected device automatically when danger arises.

XDR Extended Detection & Response

Connects data from endpoints, network and cloud to detect even complex, multi-step attacks that look harmless in isolation.

01

Security monitoring around the clock

Every login, every file change, every network connection is analysed. SentryIQ detects attack patterns in real time – even when an attacker only takes small, inconspicuous steps.

Example: Someone tries to log in 50 times at night with different passwords. SentryIQ recognises this as an attack and alerts you immediately – long before damage occurs.
02

CIS benchmark verification

The CIS Benchmark is the international security standard for IT systems. SentryIQ automatically checks whether your servers and devices meet this standard – and shows exactly what's missing.

Example: A new server is deployed, but an important security parameter isn't activated. SentryIQ finds it and reports: «Server XY meets 87% of the security requirements – 3 items missing.»
03

CVE vulnerability tracking

Every day, new vulnerabilities (CVEs) are discovered in software and operating systems. SentryIQ knows which software you use and warns you immediately if any of it is affected.

Example: A new critical vulnerability is found in a widely used web server. SentryIQ detects that you run this version and alerts: «Urgent patch required – affects your web server.»
04

Incident First Response (IFR)

When an alarm is triggered, every minute counts. SentryIQ analyses the incident automatically, classifies its severity and initiates countermeasures right away – before you even open your laptop in the morning.

Example: A ransomware process starts on a computer. SentryIQ isolates the device from the network within seconds, stops the spread and alerts your team with a complete report.

Current threats at a glance

We monitor the IT security landscape around the clock and filter out what really matters to you.

Live · loading…
Loading current threat landscape…

Easy to start, quickly secure

In just a few steps from first contact to a fully monitored infrastructure.

1

Free initial consultation

We get to know your environment: How many systems do you have? What are your biggest concerns? What needs to improve? No jargon, no sales pitch – an honest conversation at eye level.

2

Analysis & quote

Based on the conversation, we create a tailored assessment of your situation and a transparent quote – including a clear description of what you'll receive.

3

Onboarding & setup

Our team sets everything up without disrupting your day-to-day operations. Setup usually takes only a few days – then you're live and monitored.

4

Ongoing operations & reporting

You receive regular reports on the state of your IT security – clearly written, no expertise required. And whenever needed, we're available right away.

What you should know

Answers to the questions we hear most often from new customers.

SentryIQ scales flexibly – from small businesses with 10 employees to mid-sized companies with several hundred devices. We tailor the scope to your actual needs and budget. A typical setup starts with a few monitored systems and can be expanded at any time.
No. That's precisely the point: you don't need to be an IT security expert. We take care of setup, operations and response to incidents. You receive clear reports and we only contact you when something actually requires action.
For a typical SME environment, we need 3 to 10 working days from contract to full operations. More complex infrastructures may take longer – we discuss this transparently after the initial audit. Your day-to-day operations are never disrupted.
On request, exclusively in Switzerland. We offer both cloud-based and on-premise installations directly on your premises. Data protection and sovereignty are top priority for us – we discuss the appropriate solution for your industry and compliance needs.
SentryIQ immediately initiates predefined countermeasures – for example isolating an infected device. At the same time, you and our team are alerted. As part of our Incident First Response service, we support you with further investigation and recovery – with a complete, traceable report.
We work with transparent flat rates per monitored system or per consulting package – no hidden costs, no long-term commitments. After the free initial consultation, you receive an individual quote with a clearly defined scope.

Your secure customer portal

As a SentryIQ customer, you have round-the-clock access to your personal dashboard: see the current security status, open alerts, reports and system metrics – clearly organised and in real time.

Go to customer portal

No access yet? Contact us – we'll set up your account.

Let's talk

Ask us your questions – we'll get back to you within one business day.

Please provide a valid email address.
✓ Thank you! We'll get back to you within one business day.

Automatis GmbH

Free initial consultation – we explain everything on equal terms, no jargon.
Reply within one business day, guaranteed