Vulnerability management DSGVO-compliant
Greenbone Schwachstellen, IT-Security, DSGVO
The ECJ's ruling on the secure exchange of data with the data exchange with the USA has left much legal uncertainty: Companies urgently need to adapt their contracts and a new solution is not in sight. It is time to switch to modern, data protection-compliant and legally secure tools such as the Greenbone Cloud Service for vulnerability management. vulnerability management.
Also, the "EU-US Privacy Shield" agreement, which attempted to improve the
data protection for data transfers between the EU and the US (and other third
third countries) does not meet Europe's requirements, its top court ruled.
its highest court. In mid-July 2020, the European Court of Justice declared
ECJ also declared the "Privacy Shield" invalid after "Safe Harbor".
Lack of legal certainty and renewed work
For many companies, this brought not only uncertainty but also concrete work: new standard contractual clauses (SCC) must be drawn up in accordance with the of the EU Commission have to be drafted. Time is pressing: the EU's "guardian of the treaties" requires new SCCs from 27 December 2022, even for old old contracts.
What is even more annoying, however, is that the further future
of transatlantic data processing remains uncertain. A decree of the
US president's decree of October 2022 is, according to experts, just as unlikely to last
as the predecessor regulations overturned by the ECJ. The legal areas are too
legal areas are too different for a permanent and binding solution to be found,
binding solution could be found. The only safe solution would be to
legally compliant and DSGVO-compliant products from the outset.
from the outset.
Greenbone Cloud Service: DSGVO-compliant vulnerability management vulnerability management today
When it comes to vulnerability management, this is already possible today, simply with the Greenbone Cloud Service. It enables high-quality Vulnerability Management as a Service and allows users to identify vulnerabilities in their in their own network infrastructure (without installing virtual or hardware hardware appliances) in just a few steps and generates instructions for their instructions for their remediation in the form of reports. Scan requests from the network reach the scan clusters via the cloud management, which take over the core core work and return the information for the reports (more information in the information here in the data sheet).
Both for centrally managed networks and for environments that require a high degree of scalability, the Greenbone Cloud Service is perfectly suited. The platform is ready for use without local components components, users can start using the results immediately. use the results.
In addition, the Greenbone Cloud Service guarantees legal
legal certainty and DSGVO-compliant vulnerability management for all cloud
cloud customers, because the data processing takes place exclusively in German
data centres, i.e. in the European legal area and within the scope of the DSGVO.
takes place. A data transmission of any kind to the USA or other third
countries that cannot guarantee adequate data protection is therefore excluded.
therefore excluded.
Test Greenbone Cloud Service free of charge
As a "trial" the Greenbone Cloud Service is free of charge for 14 days. free of charge. Users can try it out quickly, without special know-how, directly in the web browser. browser - during this time they can scan 2 external as well as 20 internal IP addresses. A direct upgrade to a valid subscription is possible at any time. subscription is possible at any time. The Greenbone Cloud Service Trial uses the daily daily updated Greenbone Enterprise Feed.
With its help, Greenbone tests your IT network and all connected devices connected devices for more than 100,000 vulnerabilities and provides you with a daily provides you with a daily updated, accurate status of the security situation in your company. Because the vulnerability check also provides you with information about the severity, you can information on the severity, you can prioritise the identified vulnerabilities and the and prioritise the measures to be taken.
Vulnerability management that looks at your IT infrastructure from the outside is is indispensable in modern companies. So to speak with the of a potential attacker, you can ideally find every existing vulnerability in your IT infrastructure. existing vulnerabilities in your IT infrastructure and can take care of their take care of their elimination. Only those who know their weak points can implement security measures in a targeted manner.