Our vulnerability scan uses a penetration test or pentest to uncover security gaps in your IT environment. Once the vulnerabilities have been identified, we will provide you with recommendations on how to fix the problems and improve the overall security of the system.

Ein Mann mit Kopfhörern arbeitet in einem dunklen Raum an einem PC
Stay safe

Website scan and penetration test to
identify vulnerabilities

In cooperation with Enginsight, we offer effective vulnerability management in the form of penetration tests and website scans to uncover security gaps in the IT environment or on the website and then make recommendations on how you, as the IT manager, can close the gaps and improve the security of the company.

Logo von Enginsight in schwarz auf hellgrauem Hintergrund

What specific vulnerabilities exist in your company’s IT infrastructure or in your customer’s company? With our HAQA vulnerability scanner, we make the affected assets visible so that they can be patched immediately. HAQA searches networks for IT security gaps. You will then receive an evaluation of the potential risks posed by these gaps.

a

100%
Managed Service

All our services – including pentesting and website monitoring – include free managed services. This means that our team of experts at our SOC in Cologne takes care of setup, implementation and reporting.

U

100%
Cyber security expertise

Our experienced team of IT security specialists will help you proactively identify and remedy IT security gaps in order to minimise the risk of attacks and strengthen IT security in the long term.

Find vulnerabilities with pentests
before others do.

Penetration tests (or pentests) are security exercises in which we check whether your current protective measures would actually withstand an attack. Working in cooperation with Enginsight, we attack your networks, firewall, databases or other accessible services like a hacker would. With the help of informative reports, we show you any security gaps we find so that you can close them. The pentest can be carried out either once or regularly on an automated basis. You will receive the initial results within a few minutes or hours, depending on the size of your IT environment.

What is vulnerability management?

Vulnerability management is an important component in protecting IT systems in organisations against cyber threats and data loss. The aim is to identify, assess and close security gaps in IT systems before they can be exploited by potential attackers. Effective vulnerability management therefore includes identifying deficiencies in defences, assessing risks, eliminating vulnerabilities and regular IT monitoring. In cooperation with Enginsight, we offer effective vulnerability management and penetration testing.

How does the vulnerability scanner work?

HAQA is our IT security tool developed in cooperation with Enginsight. It detects vulnerabilities in IT systems and scans networks for IT security gaps. You then receive an evaluation of the potential risks posed by these gaps. The automated assessment of the severity helps with prioritisation. You then have 14 days to remedy the vulnerabilities by installing specific updates. We are of course on hand to provide you with advice and support. We then carry out a second vulnerability scan to check the success of the measures taken.

How does the penetration test work?

Our automated pentest, which takes a maximum of four weeks to complete, includes the following services:

– Provision of the necessary pentest hardware (HAQA Box)
– Installation support by a service technician
– Listing of all devices in the customer’s networks (LAN, VoIP, etc.)
– Vulnerability scan on all devices found
– Prioritisation of vulnerabilities according to urgency
– Evaluation meeting with recommendations for action
– Comprehensive final report

All security vulnerabilities found are documented and ranked according to urgency. You will receive a report on the results with recommendations for action on how to close these vulnerabilities.

What does the website scan include?

The 12-month website monitoring service includes the following:

– Availability and performance monitoring
– Certificate manager and SSL/TLS monitoring in accordance with
BSI standards
– Port monitoring with security assessment
– CVE-based vulnerability scan
– Analysis of security headers
– Checking for GDPR compliance
– Initial report on the day of setup
– Clear monthly report

We continuously scan the website for accessibility and performance, search for vulnerabilities in the web server, check the encryption parameters according to BSI standards and for GDPR compliance, and also monitor the validity periods of the certificates.

How secure is your IT
and your website?

Our vulnerability scan not only identifies potential points of attack in networks, applications and systems before cybercriminals can exploit them, thereby reducing the risk of data leaks and system failures, but also fulfils important compliance requirements such as GDPR, NIS2 and ISO 27001. Regular vulnerability scans ensure a high level of transparency regarding the IT security situation and form the basis for targeted measures to reduce risk in the long term.

g

All information available for download

You can download an overview of our vulnerability analysis as a PDF file in German language here.

PDF Download

Request vulnerability
scan now

Protect your IT infrastructure with a professional vulnerability scan that precisely identifies potential IT security gaps and provides you with tailor-made solutions. With our automated pentest and website scan, you can reduce risks, strengthen your compliance and increase the security of your systems in the long term. Arrange an appointment for a no-obligation initial consultation now!