• OPENVAS REPORT
  • Greenbone Basic
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
Greenbone
  • Products
    • Hardware Appliances
      • Greenbone Enterprise 6500
      • Greenbone Enterprise 5400
      • Greenbone Enterprise 650
      • Greenbone Enterprise 600
      • Greenbone Enterprise 450
      • Greenbone Enterprise 400
      • Greenbone Enterprise 150
      • Greenbone Enterprise 35
    • Virtual Appliances
      • Greenbone Enterprise EXA
      • Greenbone Enterprise PETA
      • Greenbone Enterprise TERA
      • Greenbone Enterprise DECA
      • Greenbone Enterprise CENO
      • Greenbone Enterprise 25V
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management | IT Security Solutions from Greenbone
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • Hardware Appliances
    • Virtual Appliances
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap and Lifecycle
    • Buy Here
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management | IT Security Solutions from Greenbone
      • The Vulnerability Timeline
      • Attack Vector Timeline
  • Deutsch
  • English
  • Italiano

Protect Yourself Against Cyber Threats

Increasingly, educational institutions are becoming victims of cyber attacks. The growing threat requires rapid and sustainable action. Vulnerability management has established itself as a proven method for making IT infrastructures more resilient against 99% of all attacks. With this method, the own IT infrastructure is viewed from the outside, from the perspective of a potential attacker. This allows security vulnerabilities to be identified and closed before an attacker succeeds in exploiting them.

Trust the Expert in Security Research

Confident. Transparent. Secure.

  • Greenbone provides you with the world’s best vulnerability coverage
  • Our over 15 years of experience in research and development enable us to detect vulnerabilities in established networks – old and new
  • Security requires transparency: with our Greenbone Enterprise solutions, we offer you best-in-class products based on open-source standards
Contact us
Logo der Allianz für Cyber-Sicherheit des Bundesamts für Sicherheit in der Informationstechnik (BSI)

Your Benefits

  • All-in-One Solution

    Version checks for simulated attacks with executed scripts, web application pentesting, as well as services and consulting

  • The Right Greenbone Product for Every Requirement

    Available as hardware, virtual, or as a SaaS cloud

  • CERT Comparisons

    For example, with DFN-CERT or CERT-Bund

  • Compliance-Checks

    Like CIS or IT-Grundschutz

Our Products

Illustration von IT-Infrastruktur mit Servern, Datenfluss und Sicherheitssymbolen – Greenbone-Lösungen für Schwachstellenmanagement als Hardware, virtuelle Appliance oder Cloud-Service

Our appliances for vulnerability management of IT infrastructures are available as hardware or in virtual form – as well as SaaS solutions for the cloud.

More

Web App Scanning

Leuchtender grüner Würfel mit Netzwerkmustern – Symbol für Pentesting und Sicherheitsprüfung von Webanwendungen

Reduce the risk of a successful cyber attack on your web applications with our Web App Scanning Service.

More

Customer Services

Illustration von Laptops, E-Mails, Dokumenten und Zahnrädern – Symbol für Customer Services wie Consulting, Schulungen und Support

Whether consulting, training & webinars, proof of concept, or support: our certified staff is always at your side.

More

Contact

We look forward to your message - we will contact you as soon as possible.

I agree to the data processing for the purpose of contacting Greenbone AG. *
Greenbone does not transmit any data to third parties. You can find further information on data protection in our Privacy Policy.

Products & Solutions

  • Hardware Appliances
  • Virtual Appliances
  • OPENVAS REPORT
  • Greenbone Basic
  • Greenbone Free
  • Greenbone Cloud Service
ISO9001-EN

Service & Support

  • Technical Support
  • Greenbone Web App Scanning
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management | IT Security Solutions from Greenbone
ISO27001-EN

About us

  • About Greenbone
  • Blog
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top