Security-Rating

Vulnerability Management

Maintain an overview and deal with vulnerabilities efficiently.

Planning and conducting security audits/penetration tests as well as dealing with and following up on the vulnerabilities identified - simple and straightforward.

Especially in a large IT landscape, it is easy to lose track of identified vulnerabilities that cannot be addressed immediately. Too often, these are forgotten over time, but have a drastic impact on the security of an organisation. The entire lifecycle of security audits and the vulnerabilities they identify can be managed with the condignum platform. From the planning and execution of security audits to the handling and follow-up of the vulnerabilities identified. And condignum even supports you in the identification of existing vulnerabilities when combined with condignum security scan services.

Security Audit Management

Audit planning and management - all in one place

Security audits can be efficiently planned, managed and tracked. All audits of the organisation as well as their results are available at all times and can be visualised on-demand.

  • All security audits at a glance
  • Tools for easy planning, management and follow-up on security audits
  • Results of audits, both current and over time (trend analyses)

Security Vulnerability Management

Always one step ahead of the attackers

The current vulnerabilities of the IT landscape are always visible. The current status of identified vulnerabilities can be easily tracked and the treatment is managed in a structured and traceable way to close open flanks.

  • Overview of all identified security vulnerabilities
  • Tools for structured and verifiable remediation

Asset Security Rating

Security status at a glance

The security level of the organisation's assets is always visible and comparable at a glance.

This is made possible by calculating a simple security rating for each asset on a scale of A - E, based on the remidiation status of the identified vulnerabilities. Keep the overview and set priorities.

  • Security rating on a scale of A - E for individual assets
  • Security rating comparison between assets