Softline AG // Services // Information Security and IT Security // Security@Softline Workshops // Security Vulnerability Scan

»Security Vulnerability Scan« –
Certainly up to date

Outdated firmware, old software versions or inadequate patch levels can shut down your business and result in the loss of sensitive business data. Therefore a periodic review of your security effectiveness is mandatory. Regular security vulnerability scans are a suitable solution if you want to maintain your operational capability and fulfil the requirements of GDPR and German IT security law. They identify existing security gaps in your IT systems and thus help to continuously reduce the risk of attacks.

Softline Security Vulnerability Scan

With our Security Vulnerability Scans, we take the position of the attacker and identify potential gateways in your IT infrastructure. You decide on the level of depth (entire IT landscape, defined sub-areas or individual components) and the systems to be examined (web services, Windows and Linux server components, IoT systems, but also network elements such as switches/ routers or control elements in production networks).

Based on the knowledge gained, we classify vulnerabilities with regard to your hazard risk and discuss possible solutions to reduce the areas of attack. If requested, we can also support you continuously within our Managed Services: We proactively identify vulnerabilities, close detected security gaps and thus permanently improve your security level.

Step one:

Analysis of your current situation

  • Collaborative assessment of the IT structure
  • Identification of the areas to be scanned
  • Planning the depth of the scan
  • Definition of the timeframe

Step two:

Execution of the scan incl. documentation of the results

  • Controlled checking of the defined areas for security gaps and anomalies
  • Documentation of the results in an extensive result protocol

Step three:

Result evaluation & presentation

  • Review of the results and classification of found vulnerabilities with regard to their vulnerability potential and their probability of occurrence
  • Summary of the results in a detailed report
  • Recommendations to fix vulnerabilities


Elimination of Gaps & Managed Vulnerability Scan

  • Removal of identified security vulnerabilities
  • Documentation of new current status
  • Planning a consistent scanning rhythm for ongoing resilience as a Managed Service
Further details