• Live Demo
  • Free Trial
  • Buy Here
  • Contact
  • German
  • English
  • Deutsch Deutsch German de
  • English English English en
Greenbone Networks
  • Solutions
    • Physical Appliances
      • GSM 6500
      • GSM 5400
      • GSM 650
      • GSM 600
      • GSM 450
      • GSM 400
      • GSM 150
      • GSM 35
    • Virtual Appliances
      • GSM EXA
      • GSM PETA
      • GSM TERA
      • GSM DECA
      • GSM CENO
      • GSM ONE
      • GSM 25V
    • Security as a Service
    • Technology
      • Security Feed
      • Product Comparison
      • Roadmap & Lifecycle
    • Support
      • Documents
    • Critical Infrastructures
      • Health
      • ICT
      • Transport
      • Water
      • Finance
      • Energy
    • Buy Here
  • Cyber Resilience
    • Vulnerability Management
    • Cyber Resilience – Report
  • Partners
    • Partner Overview
    • Channel Partner Program
    • MSSP Partner Program
    • Become a partner
    • Partner Training
  • News
    • News @ Greenbone
    • Blog
    • Events
    • Media Contact
  • About Greenbone
    • Contact
    • Careers
  • Search
  • Menu Menu

Another Perspective:
Outside-In Instead of Inside-Out

With Vulnerability Management, you’re looking at your IT infrastructure from the outside – just like a potential attacker would. The aim is to locate any vulnerability that might exist in your IT infrastructure.

Authentication

NG Firewall

N-IDPS

H-IDPS

AV-System

Vulnerability
Management

Stay One Step Ahead of Attackers

IT security is a process – vulnerability management provides the foundation. Once you know where the chinks are in your armor, you can do something about them.

The process – from recognition to remedy and monitoring – represents a continuous cycle. You’ll always be one step ahead of attackers.

Still another plus: with our IT security solutions you can focus your hot spots, thus increasing the efficiency of antivirus systems, firewalls & Co.

Recognize and Manage Risks

Any IT system is at risk of attack by skilled hackers.

Typical causes of vulnerability are improper configuration or programming errors, unauthorized installations or violations of security measures. Our Greenbone Security Manager uncovers these and countless other risks – and helps you set priorities.

Focused Action – With Our Support

Your Greenbone Security Manager will test your IT network and any devices connected to it for more than 84,000 vulnerabilities – automatically. You’ll receive a daily security status update. The vulnerability check also gives you information on the severity of the problem so that you can set priorities.

Security Is a Process

Remedies are part of vulnerability management. Recognition must thus lead to a process that will eliminate detected weaknesses. Any vulnerability management process should answer three questions:

  • Who gets which information about vulnerabilities and when?
  • Who is responsible for what?
  • What remedies are available?

Setting Priorities

Vulnerability in an on-line Web server is riskier than in an off-line system with telephone access.
Damage to machinery used in manufacturing is usually a lot more expensive to repair than damage to a Web server used for image films.

That’s why setting priorities is so important.

A Patch? Important, But no Substitute for Vulnerability Management

Even carefully patched systems require careful vulnerability management. Why?

  • System interdependency frequently makes patching impossible. Possible reasons: Special enterprise-critical applications may lose certification or they may malfunction.
  • Not every type of vulnerability can be patched.
  • Improper configuration can cause vulnerability, even with up-to-date software. Some classic examples are an administrator password like “12345678” or file system shares that are exposed to the Internet by mistake.

gsf-150x150Vulnerability Management and Greenbone – The Perfect Combination

Greenbone’s security feed tests IT networks as well as any connected devices for more than 84,000 different types of vulnerabilities – automatically. You’ll get a daily status of your threat level.

Here’s a live view of the current threat scenario: Live Greenbone Security Feed

Volle Transparenz – Made in Germany


What’s our unique selling proposition? The entire scan engine and all the check routines are available as open source. That makes them completely auditable. We’re proud of our quality and have nothing to hide. See for yourself!

Frequently asked questions about vulnerability management

What does vulnerability management mean?

Vulnerability management is an IT security process that aims to find vulnerabilities in the IT infrastructure, classify their severity and, in addition, provide a list of actions to be taken to address the vulnerabilities. The goal is to eliminate vulnerabilities so that they can no longer pose a risk.

What are the advantages of vulnerability management?

999 out of 1,000 vulnerabilities have been known for more than a year. With vulnerability management, these vulnerabilities can therefore be detected and eliminated before they are exploited by an attacker. This greatly reduces the attack surface of the IT infrastructure.

Vulnerability management systems are fully automated and, through features such as schedules and custom scan configurations, offer users the ability to create complete vulnerability management processes that constantly scan for vulnerabilities. The end result is that vulnerability management ensures more resilient systems in the long term.

What are the advantages of vulnerability management from Greenbone?

With solutions from Greenbone Networks, you receive a daily update of vulnerability tests. Since new vulnerabilities are found every day, it is important to continuously develop new tests. With the Greenbone Security Feed as part of the Greenbone solutions, you are always up to date.

Another advantage is that with Greenbone solutions you directly receive a classification of vulnerabilities according to their severity as well as possible measures for remediation. This allows for prioritisation and targeted remediation of the vulnerabilities.

In addition, when you choose Greenbone, you get technology from a trusted German manufacturer. All Greenbone solutions always comply 100% with the specifications of the highest data protection standards such as the DSGVO.

How much time does vulnerability management take?

Vulnerability management is not a one-off operation, but an ongoing process that is firmly integrated into IT security. The steps from the detection to the elimination of vulnerabilities run continuously in a constant cycle.

The duration of a scan always depends on the number of systems to be scanned or IP addresses to be scanned. Vulnerability management makes sense for any size of system, but can run for several hours as a background activity depending on the complexity of the respective scan.

What are the costs of vulnerability management from Greenbone?

The price of our solution is always based on the environment to be scanned. Depending on whether you are interested in a virtual appliance, a physical appliance or our cloud solution, our solutions cost between a few euros per month (from 10 IP addresses as a cloud solution) to several hundred thousand euros (up to 80,000 IP addresses daily for our enterprise solutions).

For which companies is vulnerability management suitable?

Every company derives significant benefits from the use of vulnerability management, as proactive security can be achieved.

Greenbone Networks’ vulnerability management solutions are suitable for businesses and government agencies of all sizes. Solutions are available for both micro-enterprises, where only a few IP addresses need to be scanned, and large enterprises with many branch offices.

Be a moving target – hard to hit

Run for cover – it’s the right reaction, even in cyberspace. But have a plan first. Vulnerability management is the answer.

You can reduce your attack surface by

99,9 %.

Tight Budget?

Vulnerability management is the smart way to go with your IT budget. We’ll calculate it for you. Get our cost-benefit white paper today.

Request now

Set up a process

We’ll be happy to help you set up your own vulnerability management process. So will any of our authorized sales partners. It will be tailored to your systems, structures and requirements.

Contact us!

Test us!

Test now

Products & Solutions

  • Physical Appliances
  • Virtual Appliances
  • Security as a Service
  • Technology
  • Critical Infrastructures
  • Support
  • Live Demo

Service & Support

  • SecInfo Portal
  • Warranty
  • Free Trial
  • Buy Here
  • FAQ
  • Documents
  • Support-Login

About us

  • About Greenbone
  • News @ Greenbone
  • Blog
  • Licence Information
  • Standards
  • Terms & Conditions
  • Privacy Statement
  • Responsible Disclosure

Contact with us

  • Contact
  • Careers
  • Become a partner
  • Security Response Team
© Copyright - Greenbone Networks 2020
  • LinkedIn
  • Xing
  • Twitter
  • Youtube
  • Facebook
  • Mail
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

Accept CookiesMore InfoReject Cookies

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Datenschutzerklärung
Einstellungen akzeptierenVerberge nur die Benachrichtigung
  • Deutsch
  • English