• OPENVAS REPORT
  • Greenbone Basic
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
Greenbone
  • Products
    • Hardware Appliances
      • Greenbone Enterprise 6500
      • Greenbone Enterprise 5400
      • Greenbone Enterprise 650
      • Greenbone Enterprise 600
      • Greenbone Enterprise 450
      • Greenbone Enterprise 400
      • Greenbone Enterprise 150
      • Greenbone Enterprise 35
    • Virtual Appliances
      • Greenbone Enterprise EXA
      • Greenbone Enterprise PETA
      • Greenbone Enterprise TERA
      • Greenbone Enterprise DECA
      • Greenbone Enterprise CENO
      • Greenbone Enterprise 25V
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • Hardware Appliances
    • Virtual Appliances
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap and Lifecycle
    • Buy Here
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
      • Attack Vector Timeline
  • Deutsch
  • English
  • Italiano

The Race to Protect from Cyber Attacks

You are being attacked, like everyone is, and it is out of our control to prevent this. No one can stop this to happen. But we protect you from the impact of cyber attacks simply by making the attacks unsuccessful even if they manage to circumvent your firewall or other defense systems. No defense system is 100% safe and it needs only one failure to result in severe damage. No one should be without defense systems, but the best defense is to be not vulnerable.

Of course, the task of making attacks unsuccessful is not a simple one. It is comprised of two central challenges: The first one is to detect an attack vector and help to close it. The second one is to do this faster than the attackers exploit your vulnerability.

So, essentially we help you win a race against the attackers. How are we doing this?

Once a vulnerability becomes known there are three things to do:

1. create a test that detects the vulnerability,

2. detect the vulnerability in case it is present in your environment,

3. close the vulnerability. So this race is a triathlon.

So, the first discipline is solely in our hands. The other 2 disciplines happen in your environment, and we support you with scanning technology and vulnerability intelligence for highest automation and prioritized detailed action plan for remediation. The attackers do almost the same, but their third discipline is exploitation not remediation.

To win the race we invest on making the availability of tests faster, improve tools to detect faster and support you for faster remediation. The goal is to come in front of the attack wave as illustrated in the chart.

Timeline chart showing how faster detection and remediation reduce the risk of cyber attacks, emphasizing reduced Time to Remediate (TTR)

Today we do have a proven and efficient process for the creation of vulnerability tests, we do collect and aggregate information about vulnerabilities and we have a full-featured scan technology. Our customers have 99% less impacts than organizations without a vulnerability management process.

But there are two unfortunate things inevitably going on: The attackers improve their tools and processes. And the number of vulnerabilities is increasingly growing. It is our job to deal with this.

In short our mission is both, simple and ambitious: Provide the best vulnerability detection.

About the Attack Vector Status over Time

Attack Vector Status What does it mean and what happens? The role of Greenbone
Exists A product with an vulnerability starts go into productive use. It is not being exploited for attacks because no one is aware of it.

Greenbone recommends to use tools and processes for the software development that at least prevent standard programming mistakes. We also recommend a security-centric process when integrating third party software modules.

This is what we do for our own products.

Known

Someone finds a vulnerability in the product. First trial exploits may occur, but the systematic large scale exploitation will usually need some time to happen.

In most cases the finder is a good guy but in rare cases a bad guy keeps the finding secret for own (criminal) exploitation purpose or for selling the knowledge to an organization with an exploitation agenda. Once exploitation happens, the good guys will of course find out and share the knowledge.

Greenbone monitors various places where discussions about newly discovered vulnerabilities occur. We begin implementing tests for our customers that can identify the presence of the vulnerability. Even if there is no solution yet, this helps the customers with isolation or other remediation measures until the vendor can present a viable solution.
Detectable A method exists that allows a user to detect the presence of the vulnerability in the IT infrastructure. Greenbone creates one or more vulnerability tests for customers to detect the vulnerability and provide all information known so far. The information are continuously updated from now own.
Detected

The user detected the vulnerability in the IT infrastructure. With this awareness decisions can be made to resolve the attack vector.

In practice this phase is influenced by the presence of multiple vulnerabilities to prioritize, lack of remediation resource or lack of vendor solution.

Greenbone provides support for prioritization directly with the actual scan report but also via managed operational services.
Closed The user applied a solution and is not vulnerable to this attack vector anymore. Greenbone’s business is to help users to get to this point as early as possible. Our processes, tools and services are all geared to minimize the duration of the phases “Known”, “Detectable” and “Detected”.

This Could Also Interest You

From CVE to Management Feed: The Vulnerability Timeline

Here you will find the timeline for the majority of known vulnerabilities – from their discovery to the release of vulnerability tests to fix them.

More

Products & Solutions

  • Hardware Appliances
  • Virtual Appliances
  • OPENVAS REPORT
  • Greenbone Basic
  • Greenbone Free
  • Greenbone Cloud Service
ISO9001-EN

Service & Support

  • Technical Support
  • Greenbone Web App Scanning
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
ISO27001-EN

About us

  • About Greenbone
  • Blog
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top

This site is only using technically necessary cookies. By continuing to browse the site, you are agreeing to use this cookies.

OKPrivacy policy

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Datenschutzerklärung
Einstellungen akzeptierenVerberge nur die Benachrichtigung