FAQ

These FAQs can help you make a decision!


We understand that you may still have questions. That’s why we’ve compiled the most frequently asked questions here and will add more answers over time. Still can’t find what you’re looking for? Feel free to get in touch with us – we’re happy to help.

Is Fryqua a type of SIEM solution?

No, Fryqua is not a SIEM (Security Information and Event Management) solution. Instead, we focus on another essential aspect of your security strategy.

A SIEM is designed to collect, analyze, and correlate log files and events from various systems to detect cyber threats. It helps security teams monitor network and system activities and respond to threats by generating real-time alerts.

Fryqua, on the other hand, focuses on monitoring data activities and access management. We provide insights into who has access to your sensitive data, how that data is being used, and whether that usage complies with regulations such as GDPR and NIS2. Rather than monitoring network or system events, we focus on what happens with the data itself, detecting unauthorized access or suspicious patterns in data usage in real time.

In short, while a SIEM helps detect threats at the system level, Fryqua offers deeper control over data activities and access. Together, these solutions form a layered security approach, with SIEM addressing external threats and Fryqua ensuring protection and compliance within your organization.

What are the benefits of using Fryqua compared to other cybersecurity products?

Most organizations invest heavily in firewalls, endpoint security and network monitoring. Logical, but these only protect the outer shell. What if the threat is already inside your organization?

Where traditional solutions stop at the front door, Fryqua goes further.

Fryqua is an agent-based solution that provides insight deep into your IT environment at file, user and system level. What sets us apart is the ability to recognize normal versus abnormal internal data usage and user behavior, fully in line with your security policy. We do this by correlating different log sources, originating from various system components, with each other. This allows us to clearly identify internal risks and unwanted activities. Consider:

  • Unauthorized access to sensitive data, such as patient records or data from the social domain
    Abuse of rights by employees with excessive authorizations
  • Insider threats, such as hackers who have long-term unnoticed access with valid login details and increased rights
  • Activities around data use and access, such as who opens, changes or copies files
  • Compliance risks, such as unnecessary access rights or missing logging on personal data

Fryqua translates access, user and system data into insights that can be converted into improvements. In doing so, we strengthen your existing security stack, not by replacing it, but by supplementing it with critical insights that other solutions lack.

Do you dare to answer these questions honestly?

  • Do you know who actually has access to your most important data and who also uses, copies or shares it? Does that match what you would expect?
  • Can you fully reconstruct an internal incident or data leak and justify it to an auditor or supervisor? How much time does that cost you now?
  • How quickly do you know when an employee with legitimate rights is abusing their access?

Fryqua helps you answer these questions. We efficiently bring abnormal behavior to light and effectively make risks visible before they cause major damage.

Because trust is good. But knowing who is really working with your data, that is data security.

How Fryqua strenghtens security by complementing MDR, EDR, XDR, and SIEM?

Here’s how Fryqua further strengthens the security provided by MDR, EDR, XDR, and SIEM:

1. Complementing MDR (Managed Detection and Response):
MDR services focus on externally managing and responding to threats in your network and endpoints. Fryqua complements this by taking a deep dive into internal data activities and access management. While MDR monitors external threats, Fryqua ensures you know who within your organization has access to sensitive data and helps prevent internal data leaks and misuse.

2. Complementing EDR (Endpoint Detection and Response):
EDR focuses on protecting endpoints such as laptops and servers against threats like malware and ransomware. Fryqua goes further by monitoring data activities at the file level. This means that in addition to device protection, you also gain visibility into who is accessing, editing, or sharing sensitive data, helping to manage both internal and external risks.

3. Complementing XDR (Extended Detection and Response):
XDR combines threat detection across endpoints, networks, and cloud services to provide a broader view of security risks. Fryqua enhances XDR by offering in-depth control over data activity and access patterns within the organization. While XDR correlates external attacks, Fryqua ensures visibility into how your sensitive data is used internally and where potential risks lie.

4. Complementing SIEM (Security Information and Event Management):
SIEM collects and correlates logs from systems and networks to detect threat patterns. Fryqua adds specific access management and compliance monitoring by providing insights into who has access to what data, along with detailed audit trails and compliance reports. Fryqua simplifies compliance with regulations such as GDPR and NIS2, while SIEM focuses on broader threat detection.

Is Fryqua a SaaS solution?

Fryqua adapts to your organization and can be flexibly deployed as an on-premise, SaaS, or PaaS solution.

Whether you're operating within a highly secure IT environment or prefer the flexibility of the cloud, Fryqua integrates seamlessly with your organization’s existing infrastructure and specific requirements.

If you opt for an on-premise installation, Fryqua is deployed on a dedicated server within your own IT environment. Full control and management remain with your internal IT team or trusted IT partner. No internet connection is required to operate the solution, allowing you to maintain complete autonomy over your IT infrastructure—ideal for environments with strict security requirements.

At no point do we have access to the system or your data, not even during updates. Only when you explicitly grant permission and temporarily provide remote access can we offer remote support.

Prefer a cloud-based solution? Fryqua is also available as a SaaS (Software-as-a-Service) and PaaS (Platform-as-a-Service) offering, delivered through our carefully selected partner providers. Even in these forms, our high standards for data access, privacy, and control remain fully upheld.

on the needs and infrastructure of your organization.

With an on-premises installation, Fryqua Data/Infra is placed on a dedicated server within your own IT environment, fully managed by your IT team or IT partner. We do not have access to the system or the data, not even during updates, unless you give explicit permission for this.

Fryqua is also available as SaaS (Software-as-a-Service) and PaaS (Platform-as-a-Service), delivered via our partners. The same strict guarantees regarding data access, privacy and control also apply in these cloud variants."

Do you require much time and effort before we can start using Fryqua?

No. Our solution is designed to seamlessly integrate with your current infrastructure. Typically, we can go live within a day, but the timeline may vary depending on defining rules, connecting network components, and coordinating with your IT provider. All we require is a dedicated server to collect data from the sources you wish to monitor for risk, and the deployment of our agents on your computers and servers.

Do you own the information that Fryqua creates, and where is it stored?

No. Our customers are the owners responsible for the data they create and store on a dedicated Fryqua server. We provide the tools and support to improve their security landscape.

Does Fryqua have access to our data?

No. We do not have access to our customers' data. All data is stored on a dedicated server either at the customer's location or with their preferred provider.

Can I reduce the number of computer users during the license term?

Yes. We understand that organizations may undergo changes like mergers or reorganizations. That's why our customers can reduce the number of computer users by up to 10% during their license term, and the license fee will be adjusted accordingly. Furthermore, they can always increase the number of computer users with no maximum limit, and the license fee will remain the same throughout the term.

I have a very tight budget. Can I get a discount?

Yes. We acknowledge that budgeting for security challenges can be tough. We often provide discounts to new customers to help them experience the added value we bring to their security environment. Existing customers can also receive discounts by extending their license terms for a longer period.

Do you have a referral program and or partnership program?

Yes. We offer a partner and referral program. Please get in touch with us for more details.