{"id":9896,"date":"2022-02-02T14:32:09","date_gmt":"2022-02-02T13:32:09","guid":{"rendered":"https:\/\/enginsight.com\/?page_id=9896"},"modified":"2024-11-26T11:37:07","modified_gmt":"2024-11-26T10:37:07","slug":"schwachstellenmanagement","status":"publish","type":"page","link":"https:\/\/enginsight.com\/de\/schwachstellenmanagement\/","title":{"rendered":"Schwachstellenmanagement"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"9896\" class=\"elementor elementor-9896\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2360d2ad elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2360d2ad\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c2fcac0\" data-id=\"2c2fcac0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-gradient='{\"angle\":-45,\"colors\":[{\"_id\":\"81bc933\",\"premium_gradient_colors\":\"#283AB8\"},{\"_id\":\"3ebcf24\",\"premium_gradient_colors\":\"#8D379E\"},{\"_id\":\"64cb559\",\"premium_gradient_colors\":\"#F13484\"},{\"_id\":\"88a4e48\",\"premium_gradient_colors\":\"#FF605D\"}]}' class=\"elementor-section elementor-inner-section elementor-element elementor-element-3ce4fefd premium-gradient-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ce4fefd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-381b4549\" data-id=\"381b4549\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-424b59c1 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"424b59c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">SICHERHEITSL&#xDC;CKEN DETEKTIEREN UND SCHLIE&#xDF;EN <\/span><span class=\"premium-dual-header-second-header \">Schwachstellen-management<\/span><\/h1> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a498c85 elementor-widget elementor-widget-text-editor\" data-id=\"a498c85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW734210 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW734210 BCX0\">Schnell, proaktiv und rund um die Uhr. Etablieren Sie ein Schwachstellenmanagement, <\/span><span class=\"NormalTextRun SCXW734210 BCX0\">das<\/span><span class=\"NormalTextRun SCXW734210 BCX0\"> mehr als nur <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW734210 BCX0\">CVE Scans<\/span><span class=\"NormalTextRun SCXW734210 BCX0\"> und Patchmanagement f&#xFC;r Sie bereith&#xE4;lt<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW734210 BCX0\"><span class=\"TextRun SCXW734210 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW734210 BCX0\">. Mit dem Schwachstellenscanner von <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW734210 BCX0\">Enginsight<\/span><span class=\"NormalTextRun SCXW734210 BCX0\"> schlie&#xDF;en Sie Sicherheitsl&#xFC;cken noch bevor diese zum Problem werden.<\/span><\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63f5c446 elementor-align-left elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-global elementor-global-23749 elementor-widget-button\" data-id=\"63f5c446\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/enginsight.com\/de\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Termin anfragen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c926ccb elementor-align-right elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-global elementor-global-23752 elementor-widget-button\" data-id=\"2c926ccb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/app.enginsight.com\/#\/signup\" id=\"ngs-top-registrieren\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt kostenlos starten<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c899459\" data-id=\"c899459\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-758a549b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"758a549b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43aa3684\" data-id=\"43aa3684\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-703358f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"703358f1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-47428efb\" data-id=\"47428efb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7dd95f0 elementor-widget elementor-widget-heading\" data-id=\"7dd95f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Entwickelt f&#xFC;r Windows, Linux und MacOS<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-481c1d86\" data-id=\"481c1d86\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31e8e248 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"31e8e248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enginsight ist die All-in-One Cybersecurity Plattform aus Deutschland, welche Ihren Sicherheitszustand analysiert, Bedrohungen erkennt und Angriffe automatisiert verhindert <strong>&#x2013; als SaaS und On-Premises.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-613cfc6b\" data-id=\"613cfc6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-215415ea elementor-widget elementor-widget-image\" data-id=\"215415ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/made-in-germany-enginsight-1-q0quox5caqcf4tmqfjum7o1lb6c6kr8877smn0rsh4.png\" title=\"made-in-germany-enginsight\" alt=\"made-in-germany-enginsight\" loading=\"lazy\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e2800d6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2e2800d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d2d9d8b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d2d9d8b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7571c80e\" data-id=\"7571c80e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23585963 elementor-widget elementor-widget-image-carousel\" data-id=\"23585963\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"slides_to_show\":\"4\",\"navigation\":\"none\",\"lazyload\":\"yes\",\"pause_on_hover\":\"no\",\"pause_on_interaction\":\"no\",\"autoplay_speed\":0,\"speed\":10000,\"autoplay\":\"yes\",\"infinite\":\"yes\"}' data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Bild Karussell\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/ZapfCreation-sw-1-q094tsonfus5sokb027hqfs8bt79dwl2xaszo56134.png\" alt=\"ZapfCreation-sw\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/G-DATA-Logo-TIGS-2017-RGB-pwdtje60w4w3cy3jjnmft7c5795ouezzvrw57b1szk.jpg\" alt=\"G DATA Logo\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Logo_Teilnehmer_Web-200x83xc-pct68u26be1yvetevoin98h7fcwr2zqt3rxdx18nwg.png\" alt=\"Allianz_fuer_Cybersicherheit_Enginsight\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/402px-Logo_TSG_Hoffenheim.svg-q9cihbab4cxicz309g1m8gy9j7r3dtqitqbg6prncw.png\" alt=\"Logo der TSG Hoffenheim\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/schaefer-holding-logo-2-q4y2lklcscaz3kij4pnp9qm9gj79gm72wdfu1n1s74.jpg\" alt=\"schaefer-holding--logo\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/TuevIT-q9cjpvst6jxyvccd07lryq23jy2nd5obybxae1ombk.png\" alt=\"TuevIT\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Bildungsministerium-q0947e74k045393rtdllb3aqn7mbxlnduf2dwqdtds.jpg\" alt=\"Bildungsministerium\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/lvv-orvd89v9ad0zrxv9vpg3t9im4r5jf672cjj4auvx8g.jpg\" alt=\"lvv\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/langeoog-orvdagtp8g12v6ol2nkrmplc14cddqwinebwm3mups.jpg\" alt=\"langeoog\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/hanseyachts-orvd9rg23x2c5ppg6ulu9dzvzptglx3rjwpsnmohds.jpg\" alt=\"hanseyachts\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a9f4d9b elementor-widget elementor-widget-spacer\" data-id=\"4a9f4d9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4280353f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4280353f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1dffc57d\" data-id=\"1dffc57d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e86f4b3 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"e86f4b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Automatischer Schwachstellenscan <\/span><span class=\"premium-dual-header-second-header \">Schwachstellen erkennen und schlie&#xDF;en<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f7c4e9 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0f7c4e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b161791 elementor-widget elementor-widget-text-editor\" data-id=\"5b161791\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p><span class=\"TextRun SCXW48196829 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW48196829 BCX0\">Welche Schwachstellen (CVEs) gibt es konkret in meiner IT-Infrastruktur? Mit dem Schwachstellenscanner von <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW48196829 BCX0\">Enginsight<\/span><span class=\"NormalTextRun SCXW48196829 BCX0\"> sehen Sie die betroffenen Assets und patchen diese umgehend. Die Bewertung des Schweregrads hilft bei der Priorisierung. So behalten Sie stets den &#xDC;berblick zum Sicherheitszustand ihrer IT.<\/span><\/span><span class=\"EOP SCXW48196829 BCX0\" data-ccp-props=\"{}\">&#xA0;<\/span><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-77c85094 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"77c85094\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2c5879ae\" data-id=\"2c5879ae\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d4dd6c8 elementor-widget elementor-widget-text-editor\" data-id=\"3d4dd6c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Alles im Blick mit dem Schwachstellenmanagement-Tool<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c5a1933 elementor-widget elementor-widget-heading\" data-id=\"4c5a1933\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Richtige Priorisierung dank Sicht auf gesamte IT<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-289025e1 elementor-widget elementor-widget-text-editor\" data-id=\"289025e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW232501998 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW232501998 BCX0\">Bringen Sie die Schwachstellen Ihrer gesamten IT-Umgebung in eine &#xDC;bersicht. So sind Sie immer &#xFC;ber den Sicherheitszustand aller Assets informiert und wissen, wo der dringlichste Handlungsbedarf besteht.&#xA0;<\/span><\/span><span class=\"EOP SCXW232501998 BCX0\" data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-113d885 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"113d885\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Verantwortliche Personen informieren<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">&#xDC;bersichtliches Dashboard<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Risikobewertung jedes Assets<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">BSI-Risiko Bewertung Ihrer Schwachstellen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1b20e5ee\" data-id=\"1b20e5ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7032583 elementor-widget elementor-widget-image\" data-id=\"7032583\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" title=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/Schwachstellenmanagement_Dashboard.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"Schwachstellenmanagement_Dashboard\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTAxMzksInVybCI6Imh0dHBzOlwvXC9lbmdpbnNpZ2h0LmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyMlwvMDNcL1NjaHdhY2hzdGVsbGVubWFuYWdlbWVudF9EYXNoYm9hcmQucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/Schwachstellenmanagement_Dashboard-1024x587.png\" class=\"attachment-large size-large wp-image-10139\" alt=\"Schwachstellenmanagement_Dashboard\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/Schwachstellenmanagement_Dashboard-1024x587.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/Schwachstellenmanagement_Dashboard-300x172.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/Schwachstellenmanagement_Dashboard-768x440.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/Schwachstellenmanagement_Dashboard.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c24b8b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c24b8b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6f0ccaaa elementor-hidden-mobile\" data-id=\"6f0ccaaa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a53610 elementor-widget elementor-widget-image\" data-id=\"6a53610\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"CVE Schwachstellen finden und fixen\" title=\"CVE Schwachstellen finden und fixen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_Sicherheitsluecken.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"Schwachstellenmanagement_Sicherheitsluecken\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTAzNDUsInVybCI6Imh0dHBzOlwvXC9lbmdpbnNpZ2h0LmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyMlwvMDRcL1NjaHdhY2hzdGVsbGVubWFuYWdlbWVudF9TaWNoZXJoZWl0c2x1ZWNrZW4ucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_Sicherheitsluecken-1024x587.png\" class=\"attachment-large size-large wp-image-10345\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_Sicherheitsluecken-1024x587.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_Sicherheitsluecken-300x172.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_Sicherheitsluecken-768x440.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_Sicherheitsluecken.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-76759bdb\" data-id=\"76759bdb\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c8e4157 elementor-widget elementor-widget-text-editor\" data-id=\"c8e4157\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whitebox Analysen mit CVE-Scan<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23b897be elementor-widget elementor-widget-heading\" data-id=\"23b897be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">H&#xF6;chste Qualit&#xE4;t der Daten<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41fd3a7f elementor-widget elementor-widget-text-editor\" data-id=\"41fd3a7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW148000730 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW148000730 BCX0\">Dank direkt auf Ihren Servern und Clients <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW148000730 BCX0\">installiertem Agent<\/span><span class=\"NormalTextRun SCXW148000730 BCX0\"> erhalten Sie valide Schwachstellenanalysen. Mit dem dauerhaften Monitoring auf Schwachstellen, sind Sie sofort &#xFC;ber eine ver&#xE4;nderte Sicherheitslage informiert.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW148000730 BCX0\"><span class=\"SCXW148000730 BCX0\">&#xA0;<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c73c22 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"4c73c22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Validierung der Sicherheitsl&#xFC;cken<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dauerhaftes Vulnerability-Monitoring<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Alarm auf neue Sicherheitsl&#xFC;cken<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4b606218 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b606218\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-34280234\" data-id=\"34280234\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26e1a618 elementor-widget elementor-widget-text-editor\" data-id=\"26e1a618\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c1600cf elementor-widget elementor-widget-heading\" data-id=\"3c1600cf\" data-element_type=\"widget\" data-widget_type=\"heading.default\"><p class=\"elementor-widget-container\">Proaktiv Schwachstellen aufdecken<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-610203e9 elementor-widget elementor-widget-heading\" data-id=\"610203e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Gefahren beseitigen\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bb4a760 elementor-widget elementor-widget-text-editor\" data-id=\"1bb4a760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db0810c elementor-widget elementor-widget-text-editor\" data-id=\"db0810c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p><span class=\"TextRun SCXW195225799 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW195225799 BCX0\">Reagieren Sie jederzeit ad&#xE4;quat auf die Gefahren, spielen Sie Patches direkt aus der Plattform ein oder automatisieren Sie Ihre Update-Prozesse. &#xDC;ber die Basics hinaus liefert Ihnen <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW195225799 BCX0\">Enginsight<\/span><span class=\"NormalTextRun SCXW195225799 BCX0\"> ein Konfigurations-Management und die Sicht des Angreifers.<\/span><\/span><span class=\"EOP SCXW195225799 BCX0\" data-ccp-props=\"{}\">&#xA0;<\/span><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e679fb elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3e679fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Updates einspielen und automatisieren<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Konfigurationen managen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automatisierter Pentest<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Schwachstellen aus drei Perspektiven f&#xFC;r die gesamte IT<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-523b28cc\" data-id=\"523b28cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-071792f elementor-widget elementor-widget-image\" data-id=\"071792f\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"Mit dem Schwachstellenmanagment-Tool von Enginsight behalten Sie den &#xDC;berblick\" title=\"Mit dem Schwachstellenmanagment-Tool von Enginsight behalten Sie den &#xDC;berblick\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_UpdateManager.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"Schwachstellenmanagement_UpdateManager\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTAzNDcsInVybCI6Imh0dHBzOlwvXC9lbmdpbnNpZ2h0LmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyMlwvMDRcL1NjaHdhY2hzdGVsbGVubWFuYWdlbWVudF9VcGRhdGVNYW5hZ2VyLnBuZyJ9\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_UpdateManager-1024x587.png\" class=\"attachment-large size-large wp-image-10347\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_UpdateManager-1024x587.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_UpdateManager-300x172.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_UpdateManager-768x440.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/Schwachstellenmanagement_UpdateManager.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-64caba94 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"64caba94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ccf4adb\" data-id=\"ccf4adb\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2dacb2eb elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2dacb2eb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6440a870\" data-id=\"6440a870\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2006b277 premium-video__glow-none elementor-widget elementor-widget-premium-addon-video-box\" data-id=\"2006b277\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"premium_video_box_video_type\":\"youtube\",\"aspect_ratio\":\"169\",\"video_lightbox_style\":\"elementor\"}' data-widget_type=\"premium-addon-video-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t\n\t\t\t\t\t<div data-lightbox='{\"type\":\"elementor\"}' id=\"premium-video-box-container-2006b277\" class=\"premium-video-box-container\" data-overlay=\"true\" data-type=\"youtube\" data-thumbnail=\"1\" data-hover=\"zoomin\">\n\t\t\t\t<div>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"premium-video-box-inner-wrap\" data-video-animation=\" animated-\" data-delay-animation=\"\">\n\t\t\t\t\t\t<div data-elementor-open-lightbox=\"yes\" data-elementor-lightbox='{\"type\":\"video\",\"videoType\":\"youtube\",\"url\":\"https:\\\/\\\/www.youtube.com\\\/embed\\\/ENHNnMHjY7g?feature=oembed&amp;rel=0&amp;mute=0&amp;loop=0&amp;controls=1&amp;playsinline=0&amp;cc_load_policy=0\",\"modalOptions\":{\"id\":\"elementor-lightbox-2006b277\",\"entranceAnimation\":\"\",\"entranceAnimation_tablet\":\"\",\"entranceAnimation_mobile\":\"\",\"videoAspectRatio\":\"169\"}}' class=\"premium-video-box-video-container\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div style=\"background-image:url('https:\/\/enginsight.com\/wp-content\/uploads\/Cyberwar-fighter-enginsight-2.jpg')\" class=\"premium-video-box-image-container zoomin\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-video-box-play-icon-container\">\n\t\t\t\t\t\t\t\t<i class=\"premium-video-box-play-icon fas fa-play\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-video-box-description-container\">\n\t\t\t\t\t\t\t\t<p class=\"premium-video-box-text\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t\tPentest-Video abspielen\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-2f32f480\" data-id=\"2f32f480\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-deee0ac elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default\" data-id=\"deee0ac\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-670055af\" data-id=\"670055af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3eb3cf10 elementor-widget elementor-widget-text-editor\" data-id=\"3eb3cf10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-id=\"2227ecd9\" data-element_type=\"widget\" data-widget_type=\"heading.default\"><div><h4>SCHWACHSTELLENSCANNER F&#xDC;R EFFEKTIVES SCHWACHSTELLENMANAGEMENT<\/h4><\/div><\/div><div data-id=\"7504f8e0\" data-element_type=\"widget\" data-widget_type=\"heading.default\"><div><div><span style=\"color: #e91e63;\">MACHEN SIE IT-SECURITY ZUM TEIL IHRER DNA<\/span><\/div><\/div><\/div><div data-id=\"3c8808db\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div><p>Je mehr Sie &#xFC;ber Ihre eigenen IT-Landschaft wissen, desto sicherer k&#xF6;nnen Sie Ihre Systeme nachhaltig gestalten. Unser <span class=\"TextRun SCXW111202532 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW111202532 BCX0\">Schwachstellenscanner<\/span><\/span> stellt hierbei einen wichtigen Grundpfeiler dar. IT-Security beinhaltet jedoch mehr als nur CVE-Scans und Patchmanagement.&#xA0;<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e062d2a elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"e062d2a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5776d01d\" data-id=\"5776d01d\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"gradient\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4621ea39 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"4621ea39\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2786a6e5\" data-id=\"2786a6e5\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-508712f4 elementor-widget elementor-widget-image\" data-id=\"508712f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"143\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/IT-Security-made-in-Germany_TeleTrusT-Seal-250.gif\" class=\"attachment-large size-large wp-image-15109\" alt=\"IT Security Made in Germany Teletrust Siegel\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-2b0323c8\" data-id=\"2b0323c8\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-15954fb0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15954fb0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2a7b2b7b\" data-id=\"2a7b2b7b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64234815 elementor--star-style-star_fontawesome elementor-widget elementor-widget-reviews\" data-id=\"64234815\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"slides_per_view\":\"1\",\"speed\":500,\"space_between\":{\"unit\":\"px\",\"size\":10,\"sizes\":[]},\"space_between_tablet\":{\"unit\":\"px\",\"size\":10,\"sizes\":[]},\"space_between_mobile\":{\"unit\":\"px\",\"size\":10,\"sizes\":[]}}' data-widget_type=\"reviews.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slider\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-fd13e6e\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__header\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/qsil.png\" alt=\"QSil AG\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">QSil AG<\/span><div class=\"elementor-star-rating\"><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><\/div><span class=\"elementor-testimonial__title\">Quarzglashersteller<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\" aria-label=\"Weiterlesen\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t&quot;Als IT-Administrator in einem mittelst&auml;ndischen Unternehmen, der eine Vielzahl von Aufgabenfeldern bearbeitet, hat Enginsight meinen Arbeitsalltag enorm erleichtert. W&auml;hrend ich zuvor zum Beispiel 1-2 Tage die Woche brauchte, um nach Sicherheitsl&uuml;cken zu scannen, ist es jetzt noch eine Stunde.&quot;\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bf435b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf435b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-265c101\" data-id=\"265c101\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4dd2dba premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"4dd2dba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Funktions&#xFC;bersicht im Detail <\/span><span class=\"premium-dual-header-second-header \">Technische Details zum Schwachstellenmanagement&#x200B;<\/span><\/h4> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f598353 elementor-widget elementor-widget-text-editor\" data-id=\"f598353\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sie m&#xF6;chten mehr <span class=\"TextRun SCXW173384689 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW173384689 BCX0\">&#xFC;ber das Gebiet des Schwachstellenmanagements und unseren Schwachstellenscanner<\/span><\/span> wissen? Dann sind Sie hier genau richtig! Erfahren Sie, was Enginsight beim Thema Schwachstellenmanagement im Detail f&#xFC;r Sie ganz automatisiert &#xFC;bernimmt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c83451b elementor-widget elementor-widget-toggle\" data-id=\"c83451b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2091\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2091\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Server und Clients mit Agent auf Schwachstellen scannen<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2091\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2091\"><p><span data-contrast=\"none\">Der auf Servern und Clients installierte Pulsar-Agent erm&#xF6;glicht die Detektion und Inventarisierung aller installierten Software. Dabei werden sowohl die Bibliotheken des Betriebssystems untersucht als auch mit der erweiterten Software&#xFC;berwachung die Dateien auf der Festplatte<\/span><span data-contrast=\"none\"> mit dem Schwachstellenscanner<\/span> <span data-contrast=\"none\">analysiert<\/span><span data-contrast=\"none\">, um nicht regul&#xE4;r installierte Software in das Inventar aufzunehmen (z.B. Portable Apps, in andere Applikationen eingebettet Programme, Java-Bibliotheken).<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><p><span data-contrast=\"none\">Das Softwareinventar bildet die beste Datenbasis f&#xFC;r den eigentlichen Schwachstellenscan<\/span><span data-contrast=\"none\">er<\/span><span data-contrast=\"none\">, den Abgleich der installierten Software mit <\/span><b><span data-contrast=\"none\">bekannten Sicherheitsl&#xFC;cken<\/span><\/b><span data-contrast=\"none\"> (Common Vulnerabilities and Exposures, kurz: CVE). Dank der Installation des Agents sind valide Ergebnisse gew&#xE4;hrleistet und False Positives werden minimiert.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><ul><li>Plattformunabh&auml;ngig (Windows &amp; Linux)<\/li><li>Beste Datenbasis dank Softwareinventar<\/li><li>Valide Ergebnisse<\/li><li>Minimierung von False Positives<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2092\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2092\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Netzwerk-Peripherie und Webseiten ohne Agent auf Schwachstellen scannen<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2092\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2092\"><p><span data-contrast=\"none\">Mit <\/span><span data-contrast=\"none\">dem Schwachstel<\/span><span data-contrast=\"none\">lenscanner von <\/span><span data-contrast=\"none\">Enginsight kann auch die Netzwerk-Peripherie, auf der sich kein Pulsar-Agent installieren l&#xE4;sst, auf Sicherheitsl&#xFC;cken untersucht werden. Auch Webseiten lassen sich auf Schwachstellen &#xFC;berwachen. Dazu wird ein Sensor im Netzwerk (Hacktor) bzw. Internet (Observer) platziert. Anschlie&#xDF;end lassen sich ganze Netzwerke auf Schwachstellen scannen.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><p><span data-contrast=\"none\">Von au&#xDF;en untersuchen die Sensoren die offenen Ports und die Webanwendung auf vulnerable Software. Indem optional Zugangsdaten (Auth-Provider) hinterlegt werden, lassen sich Betriebssysteme und installierte Software abrufen, die Ergebnisse erweitern und die Validierung verbessern.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><ul><li>Netzwerke auf Sicherheitsl&#xFC;cken scannen<\/li><li>Webseiten und Webportale<\/li><li>Auth-Providers hinterlegen f&#xFC;r SNMP, WMI, SSH<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2093\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2093\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Sicherheitsl&#xFC;cken mit weiterf&#xFC;hrenden Informationen und CVS-Score bewerten<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2093\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2093\"><p><span data-contrast=\"none\">Zu allen <\/span><span data-contrast=\"none\">durch den Schwachstellenscanner erkannten <\/span><span data-contrast=\"none\">Sicherheitsl&#xFC;cken wird die zugeh&#xF6;rige CVE-Kennung angegeben. Der CVS-Score (Common Vulnerability Scoring System: 1 bis 10) erm&#xF6;glicht die Kategorisierung nach Dringlichkeit. Mit einem Risikoscore f&#xFC;r jedes Asset kann der Anwender das Patchmanagement nach Gef&#xE4;hrdung priorisieren. Ein Alarm informiert unmittelbar verantwortliche Personen &#xFC;ber neue Sicherheitsl&#xFC;cken.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><p><span data-contrast=\"none\">Weiterf&#xFC;hrende Informationen zu jeder Sicherheitsl&#xFC;cke in der NIST-Datenbank und zus&#xE4;tzlichen Quellen im Internet sind verlinkt, zum Beispiel zu m&#xF6;glichen Exploits.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><ul><li>CVS-Scoring (CVSS)<\/li><li>Risikoscore<\/li><li>Dringlichkeitslevel<\/li><li>Integration in Alarmsystem<\/li><li>Verlinkung weiterf&#xFC;hrender Informationen<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2094\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2094\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Validierung von Sicherheitsl&#xFC;cken (CVEs)<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2094\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2094\"><p>&#xA0;<\/p><p><span data-contrast=\"none\">Jede vo<\/span><span data-contrast=\"none\">m Schwachstellenscanner<\/span><span data-contrast=\"none\">&#xA0;<\/span><span data-contrast=\"none\">detektierte CVE wird &#xFC;ber die verf&#xFC;gbaren Meta-Informationen und unter Einbeziehung des Softwaretyps validiert. Anschlie&#xDF;end erh&#xE4;lt sie eine Bewertung &#xFC;ber die Validit&#xE4;ts-Ampel, die volle Transparenz garantiert.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><p><span data-contrast=\"none\">Die meisten Informationen zur Validierung stehen dem Schwachstellenscan<\/span><span data-contrast=\"none\">er<\/span><span data-contrast=\"none\"> &#xFC;ber den Pulsar-Agent zu Verf&#xFC;gung, daher ist immer eine hohe Validit&#xE4;t gegeben. Alle Assets, auf denen sich ein Pulsar-Agent installieren l&#xE4;sst, sollten daher mit der Softwarekomponente ausgestattet werden.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"14\" data-aria-level=\"1\"><span data-contrast=\"none\">Validierung auf Basis von Meta-Informationen<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"15\" data-aria-level=\"1\"><span data-contrast=\"none\">Validit&#xE4;ts-Ampel<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"16\" data-aria-level=\"1\"><span data-contrast=\"none\">Valide Ergebnisse bei CVE-Scan mit Pulsar-Agent<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2095\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2095\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Updates managen und automatisieren<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2095\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2095\"><p><span data-contrast=\"none\">Um <\/span><span data-contrast=\"none\">die <\/span><span data-contrast=\"none\">Software des <\/span><span data-contrast=\"none\">Schwachstellenscanner<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\">&#xA0;auf einen sicheren Stand zu bringen, reicht meist ein Update auf die aktuelle Version. Der Update Manager von Enginsight erm&#xF6;glicht das gezielte Einspielen von Updates &#xFC;ber mehrere Server und Clients hinweg. Dar&#xFC;ber hinaus lassen sich Updates g&#xE4;nzlich automatisieren, wobei Auto Updates auch auf sicherheitsrelevante Aktualisierungen beschr&#xE4;nkt werden k&#xF6;nnen. Das Tag-System erlaubt eine komfortable Konfiguration auch in gro&#xDF;en IT-Umgebungen.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"17\" data-aria-level=\"1\"><span data-contrast=\"none\">Plattformunabh&auml;ngig (Linux &amp; Windows)<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"18\" data-aria-level=\"1\"><span data-contrast=\"none\">Kompatibel mit Windows Server Update Services (WSUS)<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"19\" data-aria-level=\"1\"><span data-contrast=\"none\">Third-party Software auf Linux-Systemen patchen<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2096\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2096\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened jki jki-minus-solid\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Konfigurations-Management<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2096\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2096\"><p><span data-contrast=\"none\">Neben unsicherer Software stellen <\/span><b><span data-contrast=\"none\">fehlerhafte Konfigurationen<\/span><\/b><span data-contrast=\"none\"> eine zweite Risikokategorie dar, der Sie mit dem <\/span><span data-contrast=\"none\">im Schwachstellenscanner vorhandenen <\/span><span data-contrast=\"none\">Konfigurations-Management von Enginsight effektiv entgegentreten k&#xF6;nnen.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><p><span data-contrast=\"none\">Nutzen Sie die M&#xF6;glichkeit von Autofixes, um Konfigurationen direkt aus der Enginsight-Plattform zu korrigieren.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><p><span data-contrast=\"none\">Die f&#xFC;r alle g&#xE4;ngigen Betriebssysteme integrierten Security Technical Implementation Guides (STIGs) lassen sich durch eigene Richtlinien erweitern. So lassen sich auch Dokumentationspflichten effektiv erf&#xFC;llen.<\/span><span data-ccp-props='{\"335551550\":1,\"335551620\":1,\"335559685\":-20,\"335559737\":-20}'>&#xA0;<\/span><\/p><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"20\" data-aria-level=\"1\"><span data-contrast=\"none\">Microsoft Windows 10<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"21\" data-aria-level=\"1\"><span data-contrast=\"none\">Microsoft Server 2008\/2012\/2016\/2021<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"22\" data-aria-level=\"1\"><span data-contrast=\"none\">Canonical Ubuntu 16\/18\/20<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"23\" data-aria-level=\"1\"><span data-contrast=\"none\">Red Hat Enterprise 6<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><ul><li data-leveltext=\"&#xF0B7;\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"&#xF0B7;\",\"469777815\":\"hybridMultilevel\"}' aria-setsize=\"-1\" data-aria-posinset=\"24\" data-aria-level=\"1\"><span data-contrast=\"none\">SUSE Linux Enterprise 12<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335551550\":1,\"335551620\":1,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2fb4e78d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2fb4e78d\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56356a82\" data-id=\"56356a82\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d539769 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d539769\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-38d357f3\" data-id=\"38d357f3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-554a3be1 elementor-widget elementor-widget-image\" data-id=\"554a3be1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"1024\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png\" class=\"attachment-large size-large wp-image-21749\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png 795w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-233x300.png 233w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-768x989.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1193x1536.png 1193w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1590x2048.png 1590w\" sizes=\"(max-width: 795px) 100vw, 795px\"\/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Mario Jandeck, CEO Enginsight GmbH<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1d0f061f\" data-id=\"1d0f061f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4825a74c elementor-widget elementor-widget-heading\" data-id=\"4825a74c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">FAQ zu Schwachstellenmanagement<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d157ca elementor-widget elementor-widget-toggle\" data-id=\"8d157ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1471\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1471\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Was ist Schwachstellenmanagement? <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1471\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1471\"><p><span data-contrast=\"none\">Schwachstellenmanagement bezieht sich auf den Prozess der Identifizierung, Bewertung und Behebung von Schwachstellen in IT-Systemen, Netzwerken und Anwendungen. Es ist ein kritischer Bestandteil eines umfassenden Informationssicherheitsprogramms. Die Schwachstellen k&#xF6;nnen von veralteten Softwareversionen, mangelhaften Sicherheitskonfigurationen <\/span><span data-contrast=\"none\">bis hin zu fehlenden Patches<\/span><span data-contrast=\"none\"> reichen. Das Ziel des Schwachstellenmanagements ist es, potenzielle Eintrittspunkte f&#xFC;r Cyberangriffe zu minimieren und somit die Integrit&#xE4;t, Vertraulichkeit und Verf&#xFC;gbarkeit Ihrer Daten zu sch&#xFC;tzen.&#xA0;<\/span><span data-ccp-props=\"{}\">&#xA0;<\/span><\/p><p><span data-contrast=\"none\">Mit unserem Schwachstellenscanner werden potenzielle Sicherheitsl&#xFC;cken fr&#xFC;hzeitig erkannt, um die Sicherheitsrisiken Ihrer IT-Landschaft zu minimieren.<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1472\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1472\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Warum braucht man ein Schwachstellenmanagement?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1472\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1472\"><p><span data-contrast=\"none\">Ein Schwachstellenmanagement ist f&#xFC;r Unternehmen und Organisationen wichtig, um ihre IT-Systeme und -Infrastruktur gegen Cyberbedrohungen und Datenverlust zu sch&#xFC;tzen. Hierbei geht es darum, bekannte und <\/span><span data-contrast=\"none\">potenzielle<\/span><span data-contrast=\"none\"> Schwachstellen in den IT-Systemen zu erkennen, zu bewerten und zu schlie&#xDF;en, bevor sie von Angreifern ausgenutzt werden k&#xF6;nnen. <\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/p><p><span data-contrast=\"none\">Ein effektives Schwachstellenmanagement umfasst die folgenden Schritte:&#xA0;<\/span><span data-ccp-props='{\"134233117\":false,\"134233118\":false,\"335559738\":0,\"335559739\":0}'>&#xA0;<\/span><\/p><ol><li>Erkennung von Schwachstellen (Schwachstellenscanner)<\/li><li><a href=\"https:\/\/enginsight.com\/de\/risikomanagement\/\">Risikobewertung \/ Risikomanagement<\/a><\/li><li>Schwachstellenbeseitigung<\/li><li>IT-Monitoring \/ &#xDC;berwachung<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1473\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1473\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Was macht ein Schwachstellenscanner?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1473\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1473\"><p><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW219015094 BCX0\">Ein Schwachstellenscanner <\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW219015094 BCX0\">(<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW219015094 BCX0\">vulnerability<\/span><\/span><\/span> <span class=\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW219015094 BCX0\">scanner<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW219015094 BCX0\">) <\/span><\/span><\/span><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW219015094 BCX0\">ist ein<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW219015094 BCX0\">e<\/span><\/span><\/span><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW219015094 BCX0\"> automatisierte<\/span><\/span><span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW219015094 BCX0\">s<\/span><\/span><\/span> <span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW219015094 BCX0\">IT-Security-Tool<\/span><\/span><\/span> <span class=\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW219015094 BCX0\">schwachstellenanalyse<\/span><\/span><\/span> <span class=\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW219015094 BCX0\">software<\/span><\/span><\/span><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW219015094 BCX0\">, <\/span><\/span><span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW219015094 BCX0\">das<\/span><\/span><\/span> <span class=\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\"><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW219015094 BCX0\">welche <\/span><\/span><\/span><span class=\"TextRun SCXW219015094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW219015094 BCX0\">Schwachstellen in IT-Systemen erkennt. Es durchsucht das Netzwerk nach bekannten Sicherheitsl&#xFC;cken (CVEs) und gibt eine &#xDC;bersicht &#xFC;ber die potenziellen Risiken, die durch diese L&#xFC;cken entstehen k&#xF6;nnen.<\/span><\/span><span class=\"EOP SCXW219015094 BCX0\" data-ccp-props=\"{}\">&#xA0;<\/span><\/p><p><strong>Weiterf&#xFC;hrende Informationen: <a href=\"https:\/\/enginsight.com\/de\/blog\/umfassende-cve-scans-aus-drei-perspektiven-durchfuehren\/\">Umfassende CVE-Scans aus drei Perspektiven durchf&#xFC;hren<\/a><\/strong><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1474\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1474\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Was ist ein Vulnerability Management System?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1474\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1474\"><p><span class=\"TextRun SCXW170703787 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW170703787 BCX0\">Vulnerability<\/span><span class=\"NormalTextRun SCXW170703787 BCX0\"> Management System (VMS) ist ein Framework, das darauf abzielt, das Schwachstellenmanagement in einer organisierten und systematischen Art und Weise durchzuf&#xFC;hren. Ein VMS beinhaltet Sicherheits-Tools, Prozesse und Verfahren, die f&#xFC;r das Monitoren, Identifizieren, Bewerten und Schlie&#xDF;en von Schwachstellen in IT-Systemen und Netzwerken notwendig sind.<\/span><\/span><span class=\"EOP TrackedChange SCXW170703787 BCX0\" data-ccp-props=\"{}\">&#xA0;<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"Was ist Schwachstellenmanagement?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p><span data-contrast=\\\"none\\\">Schwachstellenmanagement bezieht sich auf den Prozess der Identifizierung, Bewertung und Behebung von Schwachstellen in IT-Systemen, Netzwerken und Anwendungen. Es ist ein kritischer Bestandteil eines umfassenden Informationssicherheitsprogramms. Die Schwachstellen k\\u00f6nnen von veralteten Softwareversionen, mangelhaften Sicherheitskonfigurationen <\\\/span><span data-contrast=\\\"none\\\">bis hin zu fehlenden Patches<\\\/span><span data-contrast=\\\"none\\\"> reichen. Das Ziel des Schwachstellenmanagements ist es, potenzielle Eintrittspunkte f\\u00fcr Cyberangriffe zu minimieren und somit die Integrit\\u00e4t, Vertraulichkeit und Verf\\u00fcgbarkeit Ihrer Daten zu sch\\u00fctzen.\\u00a0<\\\/span><span data-ccp-props=\\\"{}\\\">\\u00a0<\\\/span><\\\/p><p><span data-contrast=\\\"none\\\">Mit unserem Schwachstellenscanner werden potenzielle Sicherheitsl\\u00fccken fr\\u00fchzeitig erkannt, um die Sicherheitsrisiken Ihrer IT-Landschaft zu minimieren.<\\\/span><span data-ccp-props=\\\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\\\">\\u00a0<\\\/span><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Warum braucht man ein Schwachstellenmanagement?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p><span data-contrast=\\\"none\\\">Ein Schwachstellenmanagement ist f\\u00fcr Unternehmen und Organisationen wichtig, um ihre IT-Systeme und -Infrastruktur gegen Cyberbedrohungen und Datenverlust zu sch\\u00fctzen. Hierbei geht es darum, bekannte und <\\\/span><span data-contrast=\\\"none\\\">potenzielle<\\\/span><span data-contrast=\\\"none\\\"> Schwachstellen in den IT-Systemen zu erkennen, zu bewerten und zu schlie\\u00dfen, bevor sie von Angreifern ausgenutzt werden k\\u00f6nnen. <\\\/span><span data-ccp-props=\\\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\\\">\\u00a0<\\\/span><\\\/p><p><span data-contrast=\\\"none\\\">Ein effektives Schwachstellenmanagement umfasst die folgenden Schritte:\\u00a0<\\\/span><span data-ccp-props=\\\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\\\">\\u00a0<\\\/span><\\\/p><ol><li>Erkennung von Schwachstellen (Schwachstellenscanner)<\\\/li><li><a href=\\\"https:\\\/\\\/enginsight.com\\\/de\\\/risikomanagement\\\/\\\">Risikobewertung \\\/ Risikomanagement<\\\/a><\\\/li><li>Schwachstellenbeseitigung<\\\/li><li>IT-Monitoring \\\/ \\u00dcberwachung<\\\/li><\\\/ol>\"}},{\"@type\":\"Question\",\"name\":\"Was macht ein Schwachstellenscanner?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SCXW219015094 BCX0\\\">Ein Schwachstellenscanner <\\\/span><\\\/span><span class=\\\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SCXW219015094 BCX0\\\">(<\\\/span><\\\/span><\\\/span><span class=\\\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SpellingErrorV2Themed SCXW219015094 BCX0\\\">vulnerability<\\\/span><\\\/span><\\\/span> <span class=\\\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SpellingErrorV2Themed SCXW219015094 BCX0\\\">scanner<\\\/span><\\\/span><\\\/span><span class=\\\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SCXW219015094 BCX0\\\">) <\\\/span><\\\/span><\\\/span><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SCXW219015094 BCX0\\\">ist ein<\\\/span><\\\/span><span class=\\\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SCXW219015094 BCX0\\\">e<\\\/span><\\\/span><\\\/span><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SCXW219015094 BCX0\\\"> automatisierte<\\\/span><\\\/span><span class=\\\"TrackChangeTextDeletionMarker TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun TrackChangeTextDeletion SCXW219015094 BCX0\\\">s<\\\/span><\\\/span><\\\/span> <span class=\\\"TrackChangeTextDeletionMarker TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun TrackChangeTextDeletion SCXW219015094 BCX0\\\">IT-Security-Tool<\\\/span><\\\/span><\\\/span> <span class=\\\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SpellingErrorV2Themed SCXW219015094 BCX0\\\">schwachstellenanalyse<\\\/span><\\\/span><\\\/span> <span class=\\\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SpellingErrorV2Themed SCXW219015094 BCX0\\\">software<\\\/span><\\\/span><\\\/span><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SCXW219015094 BCX0\\\">, <\\\/span><\\\/span><span class=\\\"TrackChangeTextDeletionMarker TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun TrackChangeTextDeletion SCXW219015094 BCX0\\\">das<\\\/span><\\\/span><\\\/span> <span class=\\\"TrackChangeTextInsertion TrackedChange SCXW219015094 BCX0\\\"><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SCXW219015094 BCX0\\\">welche <\\\/span><\\\/span><\\\/span><span class=\\\"TextRun SCXW219015094 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SCXW219015094 BCX0\\\">Schwachstellen in IT-Systemen erkennt. Es durchsucht das Netzwerk nach bekannten Sicherheitsl\\u00fccken (CVEs) und gibt eine \\u00dcbersicht \\u00fcber die potenziellen Risiken, die durch diese L\\u00fccken entstehen k\\u00f6nnen.<\\\/span><\\\/span><span class=\\\"EOP SCXW219015094 BCX0\\\" data-ccp-props=\\\"{}\\\">\\u00a0<\\\/span><\\\/p><p><strong>Weiterf\\u00fchrende Informationen: <a href=\\\"https:\\\/\\\/enginsight.com\\\/de\\\/blog\\\/umfassende-cve-scans-aus-drei-perspektiven-durchfuehren\\\/\\\">Umfassende CVE-Scans aus drei Perspektiven durchf\\u00fchren<\\\/a><\\\/strong><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Was ist ein Vulnerability Management System?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p><span class=\\\"TextRun SCXW170703787 BCX0\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"><span class=\\\"NormalTextRun SpellingErrorV2Themed SCXW170703787 BCX0\\\">Vulnerability<\\\/span><span class=\\\"NormalTextRun SCXW170703787 BCX0\\\"> Management System (VMS) ist ein Framework, das darauf abzielt, das Schwachstellenmanagement in einer organisierten und systematischen Art und Weise durchzuf\\u00fchren. Ein VMS beinhaltet Sicherheits-Tools, Prozesse und Verfahren, die f\\u00fcr das Monitoren, Identifizieren, Bewerten und Schlie\\u00dfen von Schwachstellen in IT-Systemen und Netzwerken notwendig sind.<\\\/span><\\\/span><span class=\\\"EOP TrackedChange SCXW170703787 BCX0\\\" data-ccp-props=\\\"{}\\\">\\u00a0<\\\/span><\\\/p>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42aebfd8 elementor-widget elementor-widget-text-editor\" data-id=\"42aebfd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Scanning von Sicherheitsl&#xFC;cken von Enginsight ist Bestandteil der Enginsight Cybersecurity Plattform.&#xA0;<\/p><p>Sie m&#xF6;chten wissen, wir Sie Ihre IT-Sicherheit mit Enginsight verbessern k&#xF6;nnen? Gerne analysieren wir gemeinsam mit Ihnen ihren aktuellen Stand und wirklichen Bedarf im Bereich IT- und Netzwerksicherheit.&#xA0;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7077acbe elementor-align-left elementor-mobile-align-center elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"7077acbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/enginsight.com\/de\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Beratungstermin vereinbaren<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SICHERHEITSL&#xDC;CKEN DETEKTIEREN UND SCHLIE&#xDF;EN Schwachstellen-management Schnell, proaktiv und rund um die Uhr. Etablieren Sie ein Schwachstellenmanagement, das mehr als nur CVE Scans und Patchmanagement f&#xFC;r Sie bereith&#xE4;lt. Mit dem Schwachstellenscanner von Enginsight schlie&#xDF;en Sie Sicherheitsl&#xFC;cken noch bevor diese zum Problem werden. Termin anfragen Jetzt kostenlos starten Entwickelt f&#xFC;r Windows, Linux und MacOS Enginsight ist die [&#x2026;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_eb_attr":"","footnotes":""},"class_list":["post-9896","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/pages\/9896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/comments?post=9896"}],"version-history":[{"count":0,"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/pages\/9896\/revisions"}],"wp:attachment":[{"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/media?parent=9896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}