Jobs (DE)Terms of UsePrivacy PolicyImprint

As for DEFENDO owners there is no need to panic about "Meltdown" and "Spectre" because at first, in order to exploit the leak, malicious code has to be executed at DEFENDO. But, under normal circumstances, no foreign code is executed at DEFENDO (in contrast to e.g. web browsers, loading java script from the net).
So, how can an attacker still take advantage of the leak?
  • comes from inside: has stolen "admin" access
  • from the internet: open SSH port with hacked "admin" access
  • exploit of an unpatched security vulnerability which enables execution of code
  • by physical system access: manipulate programs by installing hard disc at another system
Anyways, an update which fixes "Meltdown" has already been published.
The abuse of "Spectre" turned out to be VERY demanding, but, since we never underestimate any threat, we will gradually release updates with patches during the upcoming weeks.
Background of our action plan:
  • Intel attack "Meltdown" affects DEFENDO (Intel CPU)
  • Attack "Spectre" affects DEFENDO (Intel) as well as DEFENDOORBITER (AMD)


DEFENDO forces a collection of best-of-breed security modules like firewall, VPN, proxies, virus scanner and anti spam system to interact for one purpose:
To be protected from all online threats and unwanted contents like malicious code, spam and hacker attacks.


Each IT scenario is different. The DEFENDO product family will adapt precisely to your demands.
DEFENDO applies for simple internet connections of small companies, for headquarters / branch office WANs, as well as for complex multi-tiered firewall systems.

More good reasons

  • No backdoors
  • More than 15 years of Internet security experience
  • Award-winning product
  • Support by our development engineers
  • Reseller loyalty
  • Made in Germany