Examples of using Vulnerability scanning in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Internal and external vulnerability scanning.
Vulnerability scanning is a crucial phase of a penetration test.
Prepare Kali Linux for vulnerability scanning with installation of OpenVAS.
Vulnerability scanning, architecture and detection methods, and rapid detection and response.
The Greenbone Security Manager(GSM) is a dedicated appliance for vulnerability scanning and vulnerability management.
We do not use vulnerability scanning and/or scanning to PCI standards.
Use of computer without the owner's authorization, including password theft, security vulnerability scanning, and port scanning. .
Integrate vulnerability scanning tools to enable automated patching and remediation.
McAfee Vulnerability Assessment SaaS helps you secure andprotect your network through accurate vulnerability scanning and actionable reporting.
Vulnerability scanning and patch management, including system updates, for Linux and Windows based programs.
Otherwise, more time-consuming reverse engineering can be undertaken ordynamic tests(e.g. vulnerability scanning and penetration testing) can be used as an alternative.
Vulnerability scanning: regular execution of security scans of portals and systems that are accessible through the Internet.
In addition to award-winning anti-malware,Kaspersky Endpoint Security for Business ADVANCED includes vulnerability scanning and patch management technologies- to help eradicate vulnerabilities within operating systems and application software.
Kaspersky's vulnerability scanning and patch management capabilities provide centralised control over the detection of application and OS vulnerabilities- and the prioritisation of application/ OS patching.
Planning/ accompaniment of vulnerability scans as well as the development and documentation of security processes.
Repeated vulnerability scans result in a self-steering process.
We analyze IT infrastructures andIT systems by using state-of-the-art expert systems for automated Vulnerability Scans.
Vulnerability scan conducted by the ASV.
We perform automated vulnerability scans on our production hosts and remediate any findings that present a risk to our environment.
Vulnerability Scans can be initiated from different(even combined) perspectives- the result is always a list of specific safety-enhancing measures.
The 360-Degree Vulnerability Scan includes a deep network scan, website application scan, and checks for weaknesses in the SQL injection and cross-site scripting areas.
Vulnerability scans and in-depth security assessments, such as those offered by TÜV SÜD, help companies to assess the security status of their industrial facilities.
Traditional IT controls are based on the reliance on endpoint security software, periodic vulnerability scans, and multitude of security products.
Based on interviews with staff and internal stakeholders or vulnerability scan analyses we analyze the requirements of your business.
The web interface is the usual option for the creation,execution and analysis of vulnerability scans.
The port list configured for a target has alarge impact on the duration of the alive test and the vulnerability scan of this target.
To protect your data and keep us GDPR-compliant, weperiodically conduct risk assessments, external vulnerability scans, and penetration tests.
In consultation with SIX you define various types of internal and external vulnerability scans and how often they are to be carried out.
The product includes anti-virus scanning of files, programs and websites, Anti-Phishing, protection from file-encrypting ransomware,network traffic control, vulnerability scan, free automatic updates and migration to a new version.
While the vulnerability scanner is designed to have a minimal invasive impact on your network environment, it still needs to interact andcommunicate with the target systems which are analyzed during a vulnerability scan.