Vulnerability Scan
Our vulnerability assessment identifies, quantifies and prioritizes the vulnerabilities of systems, using both system and application vulnerability scans. The vulnerability scans are semi-automated processes that will check whether patches or updates have been installed, bugs removed and systems securely configured. Our team will carefully review the results to sift out false positives to check whether a vulnerability really exists – and whether action needs to be taken.
Carried out by Experts
Instead of a purely automated scan you are booking our experts that support the evaluation of the scan results.
Manual Verification
Potential weaknesses are manually verified by experienced professionals to reduce false positives and save your time.
Your Personel Contact
Your assigned personal contact will guide you through the process and answer any questions you might have.
Attractive Offers
Different price-effective variants, tailored to your needs and size of your company. Ask for an individual offer.
Vulnerability Scan in 5-Steps:
1
Consultation and Proposal
We assess your specific requirements and determine which systems or applications should be scanned. Based on this, we provide a tailored proposal outlining the scan scope and methodology.
2
Kick-Off and Test Preparation
We define the prerequisites for the scan and develop a detailed plan tailored to your environment. Together, we ensure everything is set up for a smooth and effective scanning process.
3
Vulnerability Scan Execution
Our security experts conduct thorough vulnerability scans to identify security gaps in your systems. These scans are carefully executed to detect risks while ensuring uninterrupted operations.
4
Report and Results
You receive a detailed report outlining all identified vulnerabilities, their associated risks, and clear recommendations for remediation. We’re also available to review the findings with you.
5
Continuous Scanning
With our Quarterly & On-Demand Scanning, we regularly assess your systems to identify new vulnerabilities and verify that previously detected issues have been addressed. This ensures your IT infrastructure remains secure and resilient over time.
1
Consultation and Proposal
We assess your specific requirements and determine which systems or applications should be scanned. Based on this, we provide a tailored proposal outlining the scan scope and methodology.
2
Kick-Off and Test Preparation
We define the prerequisites for the scan and develop a detailed plan tailored to your environment. Together, we ensure everything is set up for a smooth and effective scanning process.
3
Vulnerability Scan Execution
Our security experts conduct thorough vulnerability scans to identify security gaps in your systems. These scans are carefully executed to detect risks while ensuring uninterrupted operations.
4
Report and Results
You receive a detailed report outlining all identified vulnerabilities, their associated risks, and clear recommendations for remediation. We’re also available to review the findings with you.
5
Continuous Scanning
With our Quarterly & On-Demand Scanning, we regularly assess your systems to identify new vulnerabilities and verify that previously detected issues have been addressed. This ensures your IT infrastructure remains secure and resilient over time.
1
Consultation and Proposal
We assess your specific requirements and determine which systems or applications should be scanned. Based on this, we provide a tailored proposal outlining the scan scope and methodology.
2
Kick-Off and Test Preparation
We define the prerequisites for the scan and develop a detailed plan tailored to your environment. Together, we ensure everything is set up for a smooth and effective scanning process.
3
Vulnerability Scan Execution
Our security experts conduct thorough vulnerability scans to identify security gaps in your systems. These scans are carefully executed to detect risks while ensuring uninterrupted operations.
4
Report and Results
You receive a detailed report outlining all identified vulnerabilities, their associated risks, and clear recommendations for remediation. We’re also available to review the findings with you.
5
Continuous Scanning
With our Quarterly & On-Demand Scanning, we regularly assess your systems to identify new vulnerabilities and verify that previously detected issues have been addressed. This ensures your IT infrastructure remains secure and resilient over time.
An external vulnerability scan identifies security weaknesses in your internet-facing systems, such as web applications, servers, and network devices. It helps detect potential entry points for cyberattacks before they can be exploited by malicious actors.
We offer two types of external vulnerability scans:
Verified Vulnerability Scan – Premium
In this option, we conduct a comprehensive vulnerability scan and manually review the results to filter out false positives. While this improves accuracy, it is important to note that this is not a full penetration test and does not include active exploitation or in-depth security analysis.Automated Vulnerability Scan – Basic
This option provides a raw vulnerability scan report without the manual review. While it is a more cost-effective solution, we strongly advise against it, as it places a significant burden on your team to analyze false positives and determine the actual risks.
For reliable security insights with minimal effort on your side, we recommend the Verified Vulnerability Scan to ensure a more accurate and actionable assessment of your external security posture.
Prerequisites:
To perform the scan, the only prerequisite on your side is to whitelist our scanner’s IP address to ensure uninterrupted access to your external systems.
Outcome:
The outcome of the vulnerability assessment is documented in the form of a report which contains a summary of the high-risk vulnerabilities, visually depicting the overall threat level and a full list of all findings, including technical details and recommendations. This report can be used by management to get an overview of the security posture of the IT environment and represents the basis for technicians to address the identified risks.
An internal vulnerability assessment identifies security weaknesses within your internal network, helping to detect misconfigurations, outdated software, and other vulnerabilities that could be exploited by attackers who gain access to your environment. This proactive approach enhances your overall security posture and minimizes internal risks.
We conduct a comprehensive vulnerability scan and manually review the results to eliminate false positives, ensuring that you receive accurate and actionable insights. Additionally, we offer authenticated scans, which provide deeper visibility into system patch levels and security configurations by using valid credentials to assess internal assets more thoroughly.
Prerequisites:
To perform the assessment, we require either a VPN connection to your internal network or access to a virtual machineor cloud instance that we provide for scanning.
Outcome:
The outcome of the vulnerability assessment is documented in the form of a report which contains a summary of the high-risk vulnerabilities, visually depicting the overall threat level and a full list of all findings, including technical details and recommendations. This report can be used by management to get an overview of the security posture of the IT environment and represents the basis for technicians to address the identified risks.
The PCI DSS Internal Vulnerability Scan is a mandatory security requirement for organizations handling payment card data. Under the latest PCI DSS standards, these scans must be authenticated and performed quarterly to ensure internal systems remain secure and compliant.
We offer a yearly package, conducting scans every quarter and providing detailed reports to support your compliance efforts. Our authenticated scans offer deeper visibility into system vulnerabilities, ensuring accurate assessments of patch levels and security configurations.
Prerequisites:
To perform the scans, we require either a VPN connection to your internal network or access to a virtual machine or cloud instance that we provide for scanning. In addition to perform authenticated scans, we require credentials to access your systems.
Outcome:
The outcome of the vulnerability assessment is documented in the form of a report which contains a summary of the high-risk vulnerabilities, visually depicting the overall threat level and a full list of all findings, including technical details and recommendations. This report can be used by management to get an overview of the security posture of the IT environment and represents the basis for technicians to address the identified risks.
Packages
Choose your favorite or let us create a tailored package for you. (all prices excl. VAT)
Basic
One-time assessment-
Infrastructure Scan
-
Application Scan
-
Prioritisation and Scoring
-
Vulnerability Assessment Report
-
Up to 16 Systems
Subscription
Quarterly premium assessment-
Infrastructure and Application Scan
-
Manual Review
-
Prioritisation and Scoring
-
Vulnerability Assessment Report
-
Up to 16 Systems
-
4 Times a Year
Premium
Extended assessment-
Infrastructure and Application Scan
-
Manual Review
-
Prioritisation and Scoring
-
Vulnerability Assessment Report
-
Up to 16 Systems