• New Community Portal launched

    The world’s most used open source vulnerability management provider has a new community home.

    Read more
  • Vulnerability Scanning even faster

    Discover more details about the high efficiency through fast and simple processes.

    Read more
  • TISAX Certification for Greenbone

    Greenbone’s Information Security Management System (ISMS) and data protection processes are now certified within the TISAX scheme.

    Read more
  • Supply Chains in Open-Source Software

    Not everyone who uses open source software follows all the best practices. We help to avoid mistakes.

    Read more
  • ISO Certification of Our Management Systems

    We are proud that we have now certified our management systems successfully for the aspects of quality (ISO 9001) and information security (ISO 27001).

    Read more
  • More than 100,000 Vulnerability Tests

    The Greenbone Security Feed now includes more than 100,000 vulnerability tests and also provides protection against large and well-known vulnerabilities such as SUPERNOVA, BlueKeep and PrintNightmare.

    Read more

 Vulnerability Management:

Your IT infrastructure’s security is the most important thing to us.

Greenbone is the world’s most trusted provider of vulnerability management. Our mission is to help you identify security vulnerabilities before they can be exploited – reducing the risk and impact of cyber attacks.

Every attack needs a matching vulnerability to be successful. Our feed used by our solutions includes over 100,000 vulnerability tests. And the scope is constantly growing as we work to add more tests that identify newly discovered vulnerabilities.

> 100,000 automated vulnerability tests 99.9 % less target area due to vulnerability management > 12 years product experience and market acceptance > 50,000 installations worldwide > 195 countries where our solutions are in use 9 out of 10 test customers would prefer to hold on to our solution > 100 sales partners worldwide

Our solutions are available in three different product lines: hardware solution, virtual solution and cloud solution. You have the option to initially test the solutions free of charge as a community version or to use them directly as a professional version.

Many organizations and government agencies trust our various vulnerability management solutions.
With over 50,000 installations and more than 100 partner companies, they are used all over the world.

PREFERRED

Businesses of all types and sizes have made Greenbone’s vulnerability management the foundation for more than 50,000 professional installation and integration projects.

TRANSPARENT

Black Box? Closed source? Backdoors? Certainly not with us! Download our Greenbone Enterprise TRIAL today and test our solution. Free of charge, of course.

COMMITTED

Our vulnerability management products identify weaknesses in your IT infrastructure, assess their risk potential, and recommend concrete measures for remediation.

What are the benefits of vulnerability management?

999 out of 1,000 vulnerabilities have been known for more than a year. Vulnerability management can therefore identify and eliminate these vulnerabilities before they are exploited by attackers. This greatly reduces the vulnerability and therefore the attack surface of the IT infrastructure.

Vulnerability management systems are fully automated and through features such as schedules and custom scan configurations, offer users the ability to create complete vulnerability management processes that constantly scan for vulnerabilities. The end result is that vulnerability management ensures more resilient systems in the long term.

For which companies is vulnerability management a useful tool?

Every company derives significant benefit from using vulnerability management, as it can be used to achieve proactive security.

Greenbone Networks’ vulnerability management solutions are suitable for businesses and government agencies of all sizes. Solutions are available for both micro-enterprises where only a few IP addresses need to be scanned and large enterprises with many branch offices.

What kind of knowledge do I need for vulnerability management from Greenbone?

The basis for vulnerability management is the awareness regarding a potential threat and the will to fix possible vulnerabilities in the system.

The mere integration of our vulnerability management solution is comparatively easy. Nevertheless, advanced IT knowledge at admin level is an advantage.

ADN Distribution GmbH

„Greenbone is the top favorite among vulnerability management solutions for ADN, which clearly stands out from the field of competitors. I value the cooperation very much. We speak the same language. For us as a distributor, this is an important plus.“

Hermann Ramacher – Managing Director ADN

About ADN

About ADN

As an IT distributor, service provider and technology provider, ADN Distribution GmbH is a reliable partner for more than 6,000 resellers, system houses and managed service providers in the DACH region. The company combines a future-proof portfolio of modern IT solutions from the areas of cloud services, cyber security, data center infrastructure, UCC and modern workplace.

 

 

OUR VULNERABILITY MANAGEMENT PROTECTS

Large companies
Small and medium companies
Critical infrastructures
Public sectors

ALL OVER THE WORLD. ARE YOU READY?

We look forward to your message.

Please use our contact form to send us a message - we will contact you as soon as possible.

I agree to the data processing for the purpose of contacting Greenbone Networks GmbH. *
Greenbone Networks does not transmit any data to third parties. You can find further information on data protection in our Privacy Policy.

Frequently Asked Questions About Vulnerability Management

Vulnerability management is an IT security process that aims to find vulnerabilities in the IT infrastructure, classify their severity and, in addition, provide a list of actions to be taken to address the vulnerabilities. The goal is to eliminate vulnerabilities so that they can no longer pose a risk.

Vulnerability management is an IT security process that focuses on finding vulnerabilities in the IT infrastructure, classifying their severity and additionally providing recommendations for remediation measures. The goal is to eliminate vulnerabilities so that they cannot be exploited by cyber criminals.

Both the Greenbone Enterprise Appliances and the Greenbone Cloud Service use the Greenbone Enterprise Feed. This is a collection of over 100,000 vulnerability tests (VTs). Put simply, for every known vulnerability, there is a vulnerability test that detects that exact vulnerability on the active elements of the IT infrastructure – desktops, servers, appliances, and intelligent components such as routers or VoIP devices.

The scanning service runs the tests on the network to be tested and thus detects existing vulnerabilities. These are rated according to their severity, which enables prioritization of remediation actions.

The price of our solution is always based on the environment to be scanned. Depending on whether you are interested in a virtual appliance, a physical appliance or our cloud solution, our solutions cost between a few euros per month to several hundred thousand euros.

Vulnerability management is not a one-off operation, but an ongoing process that is firmly integrated into IT security. The steps from the detection to the elimination of vulnerabilities run continuously in a constant cycle.

The duration of a scan always depends on the number of systems to be scanned or IP addresses to be scanned. Vulnerability management makes sense for any size of system, but can run for several hours as a background activity depending on the complexity of the respective scan.

Absolutely, because the systems mentioned focus on attack patterns – looking from the inside out. The goal is to ward off attacks that are actually taking place. Firewalls or similar systems therefore often only intervene once the attack has already happened.

In contrast, vulnerability management looks at the IT infrastructure from the outside in – similar to the perspective of attackers. The goal is to close vulnerabilities that could be exploited by potential attackers so that an attack does not even occur.

High-quality firewall systems may detect vulnerabilities, but unlike vulnerability management, they do not offer a solution approach for a detected vulnerability. In addition, firewalls, IDS or IPS systems also only detect vulnerabilities if the system allows it at all, and then only on the data traffic that passes through the respective security system.
Traffic that does not pass through the security system is not analyzed. If a Greenbone solution is in the network, every component that can be reached via an IP connection can also be checked for vulnerabilities, regardless of which device it is. This therefore also applies, for example, to industrial components, robots or production facilities.

A combination of both vulnerability management and firewall & co. is the best solution. With vulnerability management, other systems can be focused specifically on hotspots.

Patch management involves updating systems, applications and products to eliminate security vulnerabilities.

Vulnerability management is used to find, classify and prioritize existing vulnerabilities and recommend measures to eliminate them. Such a measure can be a patch, for example.

Patch management thus presupposes vulnerability management. After all, it only makes sense to patch if existing vulnerabilities are known.

In addition, patch management usually only works in IT components, but not in industrial plants and control systems, for example.

Furthermore, a patch management system requires extensive and controlling admin intervention, since not every patch is useful or uncritical for the respective system. Often, new patches also bring new vulnerabilities that a patch management system does not detect.

Patch management is a useful complement to vulnerability management an, as these systems can in turn automate patching. Under certain circumstances, our vulnerability management can also provide information directly to a patch management system, so that patching can be performed directly on the basis of security-critical assessments.

Yes, even with regular updates and patches, vulnerability management makes sense.

For example, system dependencies often do not allow an up-to-date patch. Possible reasons for this could be that special business-critical applications could lose their certification as a result or functions could be impaired.

In addition, there is not a patch for every vulnerability, or updates repeatedly create new vulnerabilities themselves. These are often not detected if no vulnerability management system is in use, which automatically checks all components again and again.

Furthermore, even a software version with current updates cannot rule out misconfigurations that lead to vulnerabilities. Classic examples of this are an administrator password “12345678” or file system shares with accidental Internet opening.

Another disadvantage for OT components is that updates cannot be automated in most cases.

Yes, continuous vulnerability management combined with patch management will gradually result in a much more resilient environment.

The biggest challenge is the initial setup and integration into the networks. But even this is possible for all our solutions within a very short time. In addition, you will receive support from Greenbone at any time.

Since it is recommended to work with different scan plans, a comprehensive asset management is required in advance of the vulnerability management to distinguish critical from less critical assets.

These days, all companies, no matter how large they are or what industry they belong to, are increasingly the focus of attackers. The most important prerequisite for vulnerability management is that those responsible in the company are aware of this fact and are willing to take appropriate preventive measures.

It is also important that you, as a potential customer, inform yourself in detail in advance: Have the performance of the solution shown to you in a test and inform yourself extensively about the acquisition and all running costs. Further technical requirements are not necessary, as the mere integration is very simple.