top of page
Vulnerability Scanning - Our Solution

Cyber threads or cyber threats that can affect your IT via the Internet are constantly increasing. Every day, the press reports new cases in which companies have fallen victim to cyber attacks. Often, security gaps are exploited that would have been easy for experts to detect, meaning that a successful attack could have been prevented.

​

Vulnerability scans are therefore already required by law as an effective countermeasure in sensitive and highly regulated areas as a protective measure.

The configuration and professional operation of vulnerability scanners is a task that requires very specialized know-how. Save your valuable resources and outsource the operation and management of the vulnerability scanners to us.

​

Our automated vulnerability scans give you a comprehensive and cost-effective overview of existing cyber threats to your IT at any time. We use a framework of various services and tools to be able to recreate the current threat situation for your assets in as much detail as possible.

​

The daily reports help you, among other things, to optimize your patch, change and release processes and can alert you before critical vulnerabilities are exploited by potential attackers.

​

You decide how often and with what intensity our scanners examine your IT.

​

With our expert knowledge, we are also available at any time to analyze the vulnerabilities found and to work with you to develop practical and tailored solutions to close the security gaps.

​

Our vulnerability scanners receive daily updates of their signatures, which can quickly identify the latest threats to your infrastructure.

​

To provide basic coverage, the scanners can examine your infrastructure at the network gateways to the Internet. However, you will receive more comprehensive protection if our components are set up and operated within your DMZ (demilitarized zone) or in your internal network. This also provides protection against insiders and other attackers who already have access to your internal network.

Functional features
  • Vulnerability scan for individual network addresses or entire network areas

  • Vulnerability database with over 50,000 known vulnerabilities as a basis

  • Comprehensive reports on every vulnerability found

  • Classification of the vulnerability into four criticality classes (High, Medium, Low, Info)

  • Assessment of the vulnerability according to the Common Vulnerability Scoring System

  • Proposed solution for each vulnerability

  • Scan interval freely configurable

  • Automated delivery of reports via email or online portal

Security Features
  • Reporting by email optionally with strong encryption

  • Reporting via the online portal with strong encryption

  • 24/7 availability monitoring of the scanning platform

  • On-premises solution possible (setting up a scanner on-site in your network)

bottom of page