Find weak spots - and get rid of them!

Did you know that? 999 out of 1,000 vulnerabilities exploited for attacks have been known for more than a year! 999 out of 1,000 vulnerabilities exploited for attacks have been known for more than a year! * Trick hackers and plug the holes in your operating systems and applications before they become a threat.

Comprehensive infrastructure protection is easier said than done. Keeping track of current releases, missed updates and patches is a real challenge for many IT departments. Cyber criminals take advantage of this and slip through open leaks into the very heart of the company. Weak points can be detected and eliminated in time through automated, continuous monitoring. Block the way for data spies!

Managed VAS - Automated scanning of weak spots

With Managed VAS (Vulnerability Assessment Service), vulnerabilities in your infrastructure remain under control. The security status in the versions of the operating systems and applications used is regularly checked by systematic scanning. The frequency of this and which of your system groups are scanned and when is determined in a joint workshop on a customer-specific basis. This "Scheduled Scanning Task" then runs automatically, taking into account, among other things, CVEs (Common Vulnerabilities and Exposures) that are updated daily, so that the scans can also immediately identify the latest cyber risks.

We take over the administration of the vulnerability analysis for you and, if necessary, control the immediate escalation of risks. As our client, you will receive regular reports and recommendations for action from us to further strengthen the cyber security of your company.

Your benefits

  • less attack surface for current cyber risks in combination with common measures such as IDS/IPS, firewall and virus protection
  • holistic transparency about the existing weak points in the network
  • immediate alert in the event of an incident
  • strict compliance guidelines (including DSGVO, BSDG, SOX) are fulfilled
  • different SLA levels possible depending on customer requirements
  • use cases and reports tailored to the customer
  • reliable operation of the solution in the BSI-certified Security Operations Center (SOC)

* Verizon Data Breach Investigation Report, NTT Global Threat Intelligence Report

How can we help you?