Vulnerability Scan

Our vulnerability assessment identifies, quantifies and prioritizes the vulnerabilities of systems, using both system and application vulnerability scans. The vulnerability scans are semi-automated processes that will check whether patches or updates have been installed, bugs removed and systems securely configured. Our team will carefully review the results to sift out false positives to check whether a vulnerability really exists – and whether action needs to be taken.

Carried out by Experts

Instead of a purely automated scan you are booking our experts that support the evaluation of the scan results.

Manual Verification

Potential weaknesses are manually verified by experienced professionals to reduce false positives and save your time.

Your Personel Contact

Your assigned personal contact will guide you through the process and answer any questions you might have.

Attractive Offers

Different price-effective variants, tailored to your needs and size of your company. Ask for an individual offer.

Vulnerability Scan in 5-Steps:

1

Consultation and Proposal

We assess your specific requirements and determine which systems or applications should be scanned. Based on this, we provide a tailored proposal outlining the scan scope and methodology.

2

Kick-Off and Test Preparation

We define the prerequisites for the scan and develop a detailed plan tailored to your environment. Together, we ensure everything is set up for a smooth and effective scanning process.

3

Vulnerability Scan Execution

Our security experts conduct thorough vulnerability scans to identify security gaps in your systems. These scans are carefully executed to detect risks while ensuring uninterrupted operations.

4

Report and Results

You receive a detailed report outlining all identified vulnerabilities, their associated risks, and clear recommendations for remediation. We’re also available to review the findings with you.

5

Continuous Scanning

With our Quarterly & On-Demand Scanning, we regularly assess your systems to identify new vulnerabilities and verify that previously detected issues have been addressed. This ensures your IT infrastructure remains secure and resilient over time.

1

Consultation and Proposal

We assess your specific requirements and determine which systems or applications should be scanned. Based on this, we provide a tailored proposal outlining the scan scope and methodology.

2

Kick-Off and Test Preparation

We define the prerequisites for the scan and develop a detailed plan tailored to your environment. Together, we ensure everything is set up for a smooth and effective scanning process.

3

Vulnerability Scan Execution

Our security experts conduct thorough vulnerability scans to identify security gaps in your systems. These scans are carefully executed to detect risks while ensuring uninterrupted operations.

4

Report and Results

You receive a detailed report outlining all identified vulnerabilities, their associated risks, and clear recommendations for remediation. We’re also available to review the findings with you.

5

Continuous Scanning

With our Quarterly & On-Demand Scanning, we regularly assess your systems to identify new vulnerabilities and verify that previously detected issues have been addressed. This ensures your IT infrastructure remains secure and resilient over time.

1

Consultation and Proposal

We assess your specific requirements and determine which systems or applications should be scanned. Based on this, we provide a tailored proposal outlining the scan scope and methodology.

2

Kick-Off and Test Preparation

We define the prerequisites for the scan and develop a detailed plan tailored to your environment. Together, we ensure everything is set up for a smooth and effective scanning process.

3

Vulnerability Scan Execution

Our security experts conduct thorough vulnerability scans to identify security gaps in your systems. These scans are carefully executed to detect risks while ensuring uninterrupted operations.

4

Report and Results

You receive a detailed report outlining all identified vulnerabilities, their associated risks, and clear recommendations for remediation. We’re also available to review the findings with you.

5

Continuous Scanning

With our Quarterly & On-Demand Scanning, we regularly assess your systems to identify new vulnerabilities and verify that previously detected issues have been addressed. This ensures your IT infrastructure remains secure and resilient over time.

An external vulnerability scan identifies security weaknesses in your internet-facing systems, such as web applications, servers, and network devices. It helps detect potential entry points for cyberattacks before they can be exploited by malicious actors.

We offer two types of external vulnerability scans:

  1. Verified Vulnerability Scan – Premium
    In this option, we conduct a comprehensive vulnerability scan and manually review the results to filter out false positives. While this improves accuracy, it is important to note that this is not a full penetration test and does not include active exploitation or in-depth security analysis.

  2. Automated Vulnerability Scan – Basic
    This option provides a raw vulnerability scan report without the manual review. While it is a more cost-effective solution, we strongly advise against it, as it places a significant burden on your team to analyze false positives and determine the actual risks.

For reliable security insights with minimal effort on your side, we recommend the Verified Vulnerability Scan to ensure a more accurate and actionable assessment of your external security posture.

Prerequisites:
To perform the scan, the only prerequisite on your side is to whitelist our scanner’s IP address to ensure uninterrupted access to your external systems.

Outcome:
The outcome of the vulnerability assessment is documented in the form of a report which contains a summary of the high-risk vulnerabilities, visually depicting the overall threat level and a full list of all findings, including technical details and recommendations. This report can be used by management to get an overview of the security posture of the IT environment and represents the basis for technicians to address the identified risks.

Packages

Choose your favorite or let us create a tailored package for you. (all prices excl. VAT)

Basic

One-time assessment
1499
  • Infrastructure Scan
  • Application Scan
  • Prioritisation and Scoring
  • Vulnerability Assessment Report
  • Up to 16 Systems

Subscription

Quarterly premium assessment
2999
/ Year
  • Infrastructure and Application Scan
  • Manual Review
  • Prioritisation and Scoring
  • Vulnerability Assessment Report
  • Up to 16 Systems
  • 4 Times a Year
Popular

Premium

Extended assessment
2499
  • Infrastructure and Application Scan
  • Manual Review
  • Prioritisation and Scoring
  • Vulnerability Assessment Report
  • Up to 16 Systems

Get In Touch

If you are interested in our services or just want to talk about Information Security, Risk or Compliance, just contact us!