Your Requirement
You would like to check your network-attached equipment for vulnerabilities open to the internet and resolve these issues, to protect your network from hackers attacks and other security risks.
Our Offer
With the aid of vulnerability scanners and in close cooperation with your staff we will scan for security vulnerabilities of your equipment and document them. On request we will work together with you on improvement of your system’s IT security.
Preconditions For Use
As the testing methods – under rare circumstances – could have an impact on IT systems of your institute, the scans must be conducted in close consultation with your institute and be approved of by its directors.
How To Use
Your Advantages
- You get to know the vulnerabilities of your network-attached equipment.
- You get advice, how to eliminate these vulnerabilities as far as possible.
- IT Security of your systems is validated and if necessary improved to protect IT security against risks due to Internet attachment.