Prevent the negative effects of a ransomware with real-time detection in your network

The SAM Cyber Alarm guards tour network realtime 24x7

SAM Cyber Alarm

Next-Gen Network Intrusion Detection

100% Dutch / NEN-7510 / ISO-27001 / POB1842

Now also available for Azure, AWS and GCP!

If you want more information please contact [email protected]

What is SAM ?

SAM is a NIDS: A Network Intrusion Detection System. A sensor that analyzes behavior based on all network traffic. And that happens for ALL connected devices with an IP address. Do not install any software and do not administer anything. Immediate alarm for connections to malicious destinations and for error/deviant behavior. This enables an organization to make itself much more resilient to digital threats. It doesn’t matter if they come from outside or inside. In addition to a burglar and fire alarm, a cyber alarm has become a necessity.

SAM alerts when preventative controls fail

A company usually takes organizational, technical and policy measures. But how do you know whether all those measures are working or whether they are being followed properly? Are you looking over the shoulder of an employee? The cyber alarm detects malicious behavior, use of Shadow-IT and misconfigurations.

With SAM, SecureMe2 has created a platform that is completely independent of a supplier of IT products and/or services. And therefore, without any form of conflict of interest, able to make an objective assessment of the state of the ICT-infrastructure.

We provide you a measurement. Not an opinion

For small, bigger and enormous organisations

SAM Cyber Alarm for SMB

Every organisation has suppliers, employees and customers. Protecting that information is essential.

SAM Threat Detection for Enterprises

Large organisations have significant (IT) challenges. SAM helps you detect issues and make the right choices.

Prevention alone is no longer sufficient

Based on the measured effectiveness at customers of SecureMe2 BV

The preventive measures that we traditionally use are no longer effective. Cybercriminals know precisely how to circumvent these technologies to invade your network. Without analysing the network traffic, it is no longer possible to establish that a hacker is in your network. Ensure installation of the undetectable SAM Cyber Alarm

Effectiveness Firewalls 92%
Effectiveness Segmentation 88%
Effectiveness Antivirus / Anti-malware 76%
Effectiveness Awareness Training 67%
Effectiveness DNS filtering 45%
Effectiveness SSL Offloading 24%
Effectiveness Sandboxing 18%

But how do you know for sure that everything is ok?

Recognize malicious behavior

Real-time analysis of all network traffic from all connected devices

By analysing all traffic based on destination and behaviour set against time, unwanted traffic is detected immediately. Every fifteen minutes, the known threats are updated in SAM’s systems and your network traffic is scanned for unwanted packets.

Want to know more about the products and services of SecureMe2?


The SAM Cyber ​​Alarm is available for both small companies and large companies. SAM is available as a mini-appliance, server-based (both tower and rack-mounted) and as a virtual appliance under VMWare, HyperV or VirtualBox. Our employees are happy to discuss the options with you.

Dutch Government Cybersecurity 2020:

"Quick detection can limit consequences, but in general it takes a long time. Detecting attacks early is a basic measure. The sooner the better. However, that remains a complex task for many organizations."

"According to a study, the average detection time of an attack in 2019 was 56 days. This average detection time is disproportionate to the speed with which an attacker can reach his target. It only takes a few hours. The annual report states that actors are quick to abuse. of published vulnerabilities. Even when the attacker is looking for less success, for example for espionage, rapid detection can limit the damage."

Increase your resilience immediately!

SAM Cyber Alarm

This website uses two types of cookies: for the correct design and use of anonymized visitor statistics via Google Analytics. More information can be found in our Privacy Policy.