Almost every system with a high level of complexity also contains vulnerabilities. The question is, who finds them first?
The condignum Security Scan Services enable you to easily and perform security scans on your own to identify existing vulnerabilities in your systems and to stay one step ahead of attackers. In combination with condignum Vulnerability Management, the treatment and tracking of vulnerabilities also becomes a breeze.
External vulnerability scan
Identify external entry points
With just a few clicks, security scans can be started to analyse the attack surface from the Internet.
Vulnerabilities in web applications and systems are identified and can be closed even before attackers abuse them.
- Professional security scans without time-consuming setup
- On-demand as well as automated regular execution
- Overview of attack vectors from the Internet
- Vulnerability overview with technical risk assessment
Internal vulnerability scan
Prevent propagation in the internal network
With minimal setup, professional security scans can be carried out in the internal network to analyse the internal attack surface as well as the propagation possibilities for attackers.
Vulnerabilities in the system landscape are identified and can be closed even before attackers abuse them.
- Professional security scans with minimal setup
- On-demand as well as automated regular execution
- Overview of attack vectors in the intranet
- Vulnerability overview with technical risk assessment