Vulnerability Management

Identify, prioritize and address vulnerabilities.

Identify, classify, prioritize, and address vulnerabilities in your systems before gaps are exploited and damage is caused.

Consolidate test results and audits
Import results from commercial and open source tools, keep track of audit results (pentests, etc.), avoid duplicates and benefit from external threat intelligence.

Centralized management
Track status and make the right risk assessment including custom acceptance criteria and thresholds. Define acceptance criteria, thresholds and responsibilities.

Continuous assessment
Continuously evaluate your attack surface and get an overview of the top vulnerabilities and the most endangered assets to be able to react.


condignum GmbH

Prinz Eugen Stra├če 70, 1040 Vienna