• OPENVAS SECURITY INTELLIGENCE
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
Greenbone
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Greenbone Group
    • Partners
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap and Lifecycle
    • Buy Here
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Greenbone Group
    • Partners
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
      • Attack Vector Timeline
  • Deutsch
  • English
  • Italiano

OPENVAS SECURITY INTELLIGENCE

With the OPENVAS products, you gain complete clarity. Our technology scans your entire IT landscape for potential vulnerabilities, assesses threats in real time and provides precise and actionable recommendations. The result is intelligent risk management that not only reacts to threats but stays ahead of them. Greenbone delivers proactive security that thinks ahead, dynamic, scalable and seamlessly integrable into any IT infrastructure, from medium sized businesses to large corporations.

OPENVAS SCAN

Security for Companies and Public Institutions

Advanced IT risk analysis and seamless compliance in customized and integrated solutions. You benefit from one of the leading vulnerability coverages on the market. Available as a hardware or virtual solution.

  • Over 180,000 vulnerability tests
  • Best detection rate on the market
  • For companies of all sizes
Learn More

OPENVAS REPORT

The New Generation of Vulnerability Management

OPENVAS REPORT offers a holistic view of all your assets and aggregates any number of OPENVAS SCANs in a clearly structured dashboard. This allows you to secure even large networks quickly and effectively..

  • Complete overview of your safety
  • Targeted insights
  • Lightning-fast evaluations
Learn More

OPENVAS BASIC

Our Entry-Level Product for Small Companies or Individual Users

Do you want to get started with more security with a cost-effective solution? Greenbone Basic offers exactly that. Install, scan and take targeted action.

  • Entry-level product for small companies
  • Easy to use
  • 100% GDPR-compliant
Learn More

Trust the Expert for Innovative Vulnerability Management!

  • Greenbone offers you the world’s largest vulnerability coverage.
  • Our solutions are based on over 15 years of research and development.
  • We deliver the world’s most widely used open source vulnerability management solution.
  • Over 15 years of partnership with the BSI are proof of our commitment to the highest security standards.

 
Previous Previous Previous Next Next Next
123456

Threema GmbH
Daniel Steiner, System Engineer

“Our company stands for security and data protection. We have to maintain a very high standard of security on our servers. As we also attach great importance to privacy, we do not use any cloud-based tools. The on-premise Greenbone Enterprise Appliance automatically performs regular security scans on all our servers. The “Greenbone Enterprise Feed” ensures that current security vulnerabilities are found.”

Threema is the world’s best-selling secure instant messenger. More than twelve million users – including over three million business users – rely on the services from Switzerland, which are consistently designed for data protection and data avoidance. No other chat service offers a comparable level of security, metadata restraint and confidentiality.

Visit Website

JobRad GmbH
Thomas Goch, System Engineer

“We recently started using the Greenbone Cloud Service. The cloud-based vulnerability management tool gives us peace of mind that our sensitive data is in safe hands, fully GDPR compliant. In addition, the Greenbone Cloud Service offer unparalleled flexibility and scalability, which has been instrumental in helping my company grow. Overall, I highly recommend this tool to anyone looking to improve the security of their business.”

“We get people out on bikes.” Founded in 2008 in the cycling city of Freiburg, the company JobRad aims from the very beginning to establish the company bicycle as an equal alternative to the company car in Germany.

Visit Website

Niels-Stensen-Kliniken Osnabrück
Andreas Lockau, Head of IT & Medical Technology (MIT)

“For us, IT security is not a one-off project, but an ongoing process. With Greenbone’s solution, we continuously check our systems for vulnerabilities and minimize IT risks in a targeted manner. This is a great addition to our Information Security Management System (ISMS), which integrates a SIEM solution and a SOC. This enables us to protect sensitive patient data in the long term and strengthen the digital resilience of our hospital IT.”

The Niels Stensen Clinics are the largest healthcare organisation in the Osnabrück-Emsland region. The network includes somatic hospitals, specialist clinics for psychiatry, psychosomatics and psychotherapy, long-term and short-term care facilities, and a large training center for healthcare professions. There are also specialist medical care centres.

Visit Website

ADN Distribution GmbH
Hermann Ramacher, CEO

“Greenbone is the top favorite among vulnerability management solutions for ADN, which clearly stands out from the field of competitors. I value the cooperation very much. We speak the same language. For us as a distributor, this is an important plus.“

As an IT distributor, service provider and technology provider, ADN Distribution GmbH is a reliable partner for more than 6,000 resellers, system houses and managed service providers in the DACH region. The company combines a future-proof portfolio of modern IT solutions from the areas of cloud services, cyber security, data center infrastructure, UCC and modern workplace.

Visit Website

ALSO Deutschland GmbH
Mike Rakowski, CEO

“Greenbone products are the perfect addition to our company portfolio besides reactive security tools like firewalls and convince us and our partners in quality and performance. In combination with the professional cooperation with the Greenbone team, this opens up very good sales opportunities for us in the IT market.”

ALSO is one of the leading technology providers for the ICT industry, currently operating in 29 countries in Europe and in a total of 144 countries worldwide through PaaS partners. The ALSO ecosystem comprises a total potential of around 120,000 resellers to whom we offer hardware, software and IT services from more than 700 vendors in over 1450 product categories.

Visit Website

Michael Wessel Informationstechnologie GmbH
Michael Wessel, CEO

“The security of our customers’ IT networks is our top priority. Therefore, we appreciate the high quality and reliability of Greenbone and their products and services. We are very much looking forward to further cooperation and together we are declaring war on the vulnerability of IT systems!”

Michael Wessel Informationstechnologie GmbH is a multi-vendor service provider for a wide range of information technologies. They enhance the performance of companies in all industries through strategic consulting, digital solutions and professional IT services.

Visit Website

Greenbone Newsletter

Receive exclusive news and tips on the topic of cyber security.

Subscribe Now

Our Services: Personal, Professional and Here for You

Behind each of our services is not a bot, but a real person with specialist knowledge, experience and the ambition to really help you move forward. Whether in webinars, individual partner training or technical support: we listen, think and act in a solution-oriented manner. For Greenbone, service is not just an add-on, but a promise. Because real security is created when technology and people work hand in hand.

Web App Scanning Service

Leuchtender grüner Würfel mit Netzwerkmustern – Symbol für Pentesting und Sicherheitsprüfung von Webanwendungen

Protect your web applications effectively against real threats: Our Web App Scanning Service tests all OWASP Top 10 vulnerabilities – precisely, manually validated and practically prioritized.

More

Webinars

Our webinars inform you about the latest security trends, uncover the latest vulnerabilities with you and keep you informed about updates to the solutions.

More

Support

Individual support in German and English – with the full manufacturer’s warranty for hardware, daily vulnerability tests and regular software upgrades.

More

Partner

Exclusively for our partners, we offer special conditions, technical support and customized training – so that you can understand, promote and implement our solutions with confidence.

More

FAQ

Who is Greenbone?

Greenbone was founded in 2008 by leading experts in the fields of network security and Free Software. Our goal is to develop products and concepts that help you to avoid attacks on your network infrastructure.

How? By detecting vulnerabilities faster than the attackers. We attach particular importance to a transparent White Box. Our turnkey solution is suitable for small and medium-sized companies as well as for operation in a critical Fortune-500 IT environment.

What is our approach?

We rely on a holistic approach. Our goal is to minimize and manage risks resulting from vulnerabilities in systems. Greenbone is the first provider to offer a 100 % Open Source vulnerability management solution. With this White Box solution you can avoid risks resulting from the use of a proprietary vulnerability analysis system in critical IT infrastructures.

Greenbone is engaged in the global and multi-cultural open-source communities in a cooperative manner. We act according to the concept of take and give and joint development processes in Free Software.

How do our products work?

Our technology is available in two different versions: the Greenbone Enterprise Appliances and the Greenbone Cloud Service. These are turnkey solutions for vulnerability scanning.

The Greenbone Enterprise Appliances are available as hardware or in virtual form. They consist of the Greenbone Operating System (GOS), a scan service, the web interface and, in the case of the hardware appliances, a special hardware.

The Greenbone Cloud Service is a SaaS solution, where scan requests are forwarded to the Greenbone Scan Cluster via the cloud.

Both the Greenbone Enterprise Appliances and the Greenbone Cloud Service use the Greenbone Enterprise Feed – our base technology. It is a collection of vulnerability tests (VTs) to detect known and potential security vulnerabilities in all active elements of your IT infrastructure: desktop PCs, servers, appliances, and intelligent components such as routers or VoIP devices.

Are there alternative solutions?

Unlike other security solutions, vulnerability management allows you to view your IT infrastructure from the outside – from the perspective of a potential attacker. The aim is to find any existing vulnerabilities in your IT infrastructure. And that’s not all: our solution shows ways and processes to eliminate them. There is no other solution that can take over these functions completely.

How to buy our products?

Here you can reach the contact form for product requests.

What are the differences between the Greenbone Enterprise Feed and the Greenbone Community Feed?

Central differences between the paid subscription of the Greenbone Enterprise Feed and the free Greenbone Community Feed can be found here.

What are the differences between the Greenbone Enterprise Appliance and an own Greenbone Community Edition installation?

The central differences between the Greenbone Enterprise Appliance (in combination with the Greenbone Enterprise Feed) and a self-configured Greenbone Community Edition installation can be found here.

Is there a way to test the vulnerability scanning?

Our enterprise-grade vulnerability management for small businesses, Greenbone Basic, is available for a free 14-day trial. Greenbone Cloud Service is also offered as a trial version.

Are the Greenbone solutions in conflict with German law known as “hacker paragraph” 202c StGB?

The short answer is: No.

For a detailed answer referencing German law, please see the German version of this FAQ entry.

Is the usage of a Greenbone Security Manager compatible with the GDPR?

Our system only scans the environment defined by the operator of the physical or virtual appliance for possible vulnerabilities. The customer defines the target and thus the infrastructure to be scanned. Only company networks and no personal data (detailed definition in our privacy policy) are checked. The resulting data remains exclusively with the operator of the appliance. No data is passed on to the manufacturer or any third party.

In addition, the environment defined by the operator can be checked for compliance guidelines using pre-configured scan configurations to ensure that all components integrated in the system meet the required specifications.

What is the difference between Vulnerability Management and Vulnerability Assessment, penetration testing or IDS/IPS or firewall solutions?

A crucial difference to antivirus systems, IDS/IPS installations and firewall solutions lies in the perspective.

The systems mentioned concentrate on the attack patterns – with the view from the inside out. In contrast, Vulnerability Management looks at the IT infrastructure from the outside to the inside – similar to the perspective of an attacker.

Penetration testing takes the same perspective. But here too, there is a significant difference: it is a concrete task to penetrate a corporate network and take control. Once this goal has been achieved, the penetration test ends and other vulnerabilities remain unnoticed. Vulnerability Management, on the other hand, is designed to find every single vulnerability.

While Vulnerability Assessment is a one-time inventory of the security situation of an IT infrastructure, Vulnerability Management improves the security level with a complete process.

Why does Vulnerability Management increase the level of security?

Vulnerability Management drastically reduces the attack surface of a company’s IT. Furthermore, Vulnerability Management allows other IT security solutions in use (IDS/IPS and firewall) to focus on the actual hot spots: the solutions receive information about the most critical vulnerabilities. This takes place within a process that prioritizes vulnerabilities based on accepted standards (SCAP) and company-specific factors and removes or mitigates them – in line with critical business processes. Ideally, this process is part of a comprehensive IT security framework.

How compatible is Vulnerability Management with IDS/IPS and other IT security products?

Vulnerability Management is an essential element of an IT security infrastructure and complements the other components.

IDS/IPS solutions – network-based, host-based or designed as Network Behaviour Analysis (NBA) – have to be set up and adjusted during setup and during ongoing operation. For an NBA it is necessary to establish a baseline (e.g., limits for port scans and login attempts, blacklists and whitelists of IP addresses and user names as well as settings for alarms).

By importing the results of vulnerability scans, you can significantly supplement and improve this tuning: the information can be used to focus the resources of an IDS/IPS and thus make better and faster decisions on the necessary action and alerting. False-positive messages are reduced.

Attacks on an IDS/IPS such as overloading the capacity or ‘blinding’ are so-called evasion techniques. Together with the difficulty of an IDS/IPS to detect slow, targeted attacks, they push these IT security solutions to their limits. Vulnerability Management offers the necessary complement, as it can significantly reduce the attack surface.

Products & Solutions

  • OPENVAS SCAN
  • OPENVAS REPORT
  • OPENVAS BASIC
  • OPENVAS FREE
  • Greenbone Cloud Service
  • Greenbone Web App Scanning
ISO9001-EN

Service & Support

  • Technical Support
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
  • Cyber Resilience Act
ISO27001-EN

About us

  • About Greenbone
  • Greenbone Group
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top