Now free initial consultation by mail or phone: +49 228 - 33 88 89 0

4 simple steps to a managed vulnerability scan

  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ -
Define the areas to be scanned
In order to be able to analyse your operational IT infrastructure, all areas to be scanned must be determined beforehand. This can include servers, internet connections (static IP or URL via Dynamic DNS) or VPN tunnels.
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀, ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ -
Analysis of your existing IT infrastructure
After you have defined all relevant areas, the GMSP is ready for operation. Now, depending on the package, you can check any number of devices within your company network for vulnerabilities or misconfigured hardware and software.
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀, ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ -
Analysis report and inventory list
After the analysis has been completed, you will receive a detailed report sorted by the severity of the vulnerability found. Furthermore, an inventory list of all IP-enabled devices found in your company is automatically provided.
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀, ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ -
Use of the analysis report and further action
Based on the analysis report, you can now see exactly which attack surfaces your company's IT infrastructure offers and initiate necessary processes and procedures. If, for example, devices with unpatchable legacy software have been identified, these can now either be isolated or protected by implementing firewall rules. Our experts at EnBITCon will be happy to advise you on how to proceed or, if you wish, to work with you to remedy existing security vulnerabilities.
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀, ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀