• OPENVAS REPORT
  • Greenbone Basic
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
Greenbone
  • Products
    • Hardware Appliances
      • Greenbone Enterprise 6500
      • Greenbone Enterprise 5400
      • Greenbone Enterprise 650
      • Greenbone Enterprise 600
      • Greenbone Enterprise 450
      • Greenbone Enterprise 400
      • Greenbone Enterprise 150
      • Greenbone Enterprise 35
    • Virtual Appliances
      • Greenbone Enterprise EXA
      • Greenbone Enterprise PETA
      • Greenbone Enterprise TERA
      • Greenbone Enterprise DECA
      • Greenbone Enterprise CENO
      • Greenbone Enterprise 25V
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • Hardware Appliances
    • Virtual Appliances
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap and Lifecycle
    • Buy Here
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
      • Attack Vector Timeline
  • Deutsch
  • English
  • Italiano

The most frequent questions and answers about us and our products

Click on the plus sign to read the answers.

Who is Greenbone?

Greenbone was founded in 2008 by leading experts in the fields of network security and Free Software. Our goal is to develop products and concepts that help you to avoid attacks on your network infrastructure.

How? By detecting vulnerabilities faster than the attackers. We attach particular importance to a transparent White Box. Our turnkey solution is suitable for small and medium-sized companies as well as for operation in a critical Fortune-500 IT environment.

What is our approach?

We rely on a holistic approach. Our goal is to minimize and manage risks resulting from vulnerabilities in systems. Greenbone is the first provider to offer a 100 % Open Source vulnerability management solution. With this White Box solution you can avoid risks resulting from the use of a proprietary vulnerability analysis system in critical IT infrastructures.

Greenbone is engaged in the global and multi-cultural open-source communities in a cooperative manner. We act according to the concept of take and give and joint development processes in Free Software.

How do our products work?

Our technology is available in two different versions: the Greenbone Enterprise Appliances and the Greenbone Cloud Service. These are turnkey solutions for vulnerability scanning.

The Greenbone Enterprise Appliances are available as hardware or in virtual form. They consist of the Greenbone Operating System (GOS), a scan service, the web interface and, in the case of the hardware appliances, a special hardware.

The Greenbone Cloud Service is a SaaS solution, where scan requests are forwarded to the Greenbone Scan Cluster via the cloud.

Both the Greenbone Enterprise Appliances and the Greenbone Cloud Service use the Greenbone Enterprise Feed – our base technology. It is a collection of vulnerability tests (VTs) to detect known and potential security vulnerabilities in all active elements of your IT infrastructure: desktop PCs, servers, appliances, and intelligent components such as routers or VoIP devices.

Are there alternative solutions?

Unlike other security solutions, vulnerability management allows you to view your IT infrastructure from the outside – from the perspective of a potential attacker. The aim is to find any existing vulnerabilities in your IT infrastructure. And that’s not all: our solution shows ways and processes to eliminate them. There is no other solution that can take over these functions completely.

How to buy our products?

Here you can reach the contact form for product requests.

What are the differences between the Greenbone Enterprise Feed and the Greenbone Community Feed?

Central differences between the paid subscription of the Greenbone Enterprise Feed and the free Greenbone Community Feed can be found here.

What are the differences between the Greenbone Enterprise Appliance and an own Greenbone Community Edition installation?

The central differences between the Greenbone Enterprise Appliance (in combination with the Greenbone Enterprise Feed) and a self-configured Greenbone Community Edition installation can be found here.

Is there a way to test the vulnerability scanning?

Our enterprise-grade vulnerability management for small businesses, Greenbone Basic, is available for a free 14-day trial. Greenbone Cloud Service is also offered as a trial version.

Are the Greenbone solutions in conflict with German law known as "Hacker-Paragraph" 202c StGB?

The short answer is: No.

For a detailed answer referencing German law, please see the German version of this FAQ entry.

 

Is the usage of a Greenbone Security Manager compatible with the GDPR?

Our system only scans the environment defined by the operator of the physical or virtual appliance for possible vulnerabilities. The customer defines the target and thus the infrastructure to be scanned. Only company networks and no personal data (detailed definition in our privacy policy) are checked. The resulting data remains exclusively with the operator of the appliance. No data is passed on to the manufacturer or any third party.

In addition, the environment defined by the operator can be checked for compliance guidelines using pre-configured scan configurations to ensure that all components integrated in the system meet the required specifications.

What is the difference between Vulnerability Management, Vulnerability Assessment, penetration testing or IDS/IPS or firewall solutions?

A crucial difference to antivirus systems, IDS/IPS installations and firewall solutions lies in the perspective.

The systems mentioned concentrate on the attack patterns – with the view from the inside out. In contrast, Vulnerability Management looks at the IT infrastructure from the outside to the inside – similar to the perspective of an attacker.

Penetration testing takes the same perspective. But here too, there is a significant difference: it is a concrete task to penetrate a corporate network and take control. Once this goal has been achieved, the penetration test ends and other vulnerabilities remain unnoticed. Vulnerability Management, on the other hand, is designed to find every single vulnerability.

While Vulnerability Assessment is a one-time inventory of the security situation of an IT infrastructure, Vulnerability Management improves the security level with a complete process.

Why does Vulnerability Management increase the level of security?

Vulnerability Management drastically reduces the attack surface of a company’s IT. Furthermore, Vulnerability Management allows other IT security solutions in use (IDS/IPS and firewall) to focus on the actual hot spots: the solutions receive information about the most critical vulnerabilities. This takes place within a process that prioritizes vulnerabilities based on accepted standards (SCAP) and company-specific factors and removes or mitigates them – in line with critical business processes. Ideally, this process is part of a comprehensive IT security framework.

How compatible is Vulnerability Management with IDS/IPS and other security solutions?

Vulnerability Management is an essential element of an IT security infrastructure and complements the other components.

IDS/IPS solutions – network-based, host-based or designed as Network Behaviour Analysis (NBA) – have to be set up and adjusted during setup and during ongoing operation. For an NBA it is necessary to establish a baseline (e.g., limits for port scans and login attempts, blacklists and whitelists of IP addresses and user names as well as settings for alarms).

By importing the results of vulnerability scans, you can significantly supplement and improve this tuning: the information can be used to focus the resources of an IDS/IPS and thus make better and faster decisions on the necessary action and alerting. False-positive messages are reduced.

Attacks on an IDS/IPS such as overloading the capacity or ‘blinding’ are so-called evasion techniques. Together with the difficulty of an IDS/IPS to detect slow, targeted attacks, they push these IT security solutions to their limits. Vulnerability Management offers the necessary complement, as it can significantly reduce the attack surface.

Products & Solutions

  • Hardware Appliances
  • Virtual Appliances
  • OPENVAS REPORT
  • Greenbone Basic
  • Greenbone Free
  • Greenbone Cloud Service
ISO9001-EN

Service & Support

  • Technical Support
  • Greenbone Web App Scanning
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
ISO27001-EN

About us

  • About Greenbone
  • Blog
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top

This site is only using technically necessary cookies. By continuing to browse the site, you are agreeing to use this cookies.

OKPrivacy policy

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Datenschutzerklärung
Einstellungen akzeptierenVerberge nur die Benachrichtigung