Now free initial consultation by mail or phone: +49 228 - 33 88 89 0

4 simple steps to effective weak link management

 -
Installation of the Greenbone GSM
In order to be able to analyse your operational IT infrastructure, an installation of the Greenbone GSM is required. This can be easily installed on a suitable hypervisor such as Hyper-V, VMWare or VirtualBox.
,
 -
Analysis of your existing IT infrastructure
After an installation time of 10 minutes, the Greenbone GSM is ready for operation. Now you can check IP-enabled devices within your corporate network for vulnerabilities or misconfigured hardware and software.
,
 -
Analysis report and inventory list
After the analysis has been completed, you will receive a detailed report in the GSM web interface, sorted according to the severity of the vulnerability found. Furthermore, an inventory list of all IP-capable devices found in your company is automatically provided.
,
 -
Use of the analysis report and further procedure
Based on the analysis report, you can now see exactly which attack surfaces your company's IT infrastructure offers and initiate necessary processes and procedures. For example, if devices with unpatchable legacy software have been identified, they can now either be isolated or protected by implementing firewall rules.
,