{"id":34080,"date":"2023-01-26T08:56:54","date_gmt":"2023-01-26T07:56:54","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=34080"},"modified":"2026-01-08T13:40:30","modified_gmt":"2026-01-08T12:40:30","slug":"security-scan","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-analysis-pentests\/security-scan\/","title":{"rendered":"Security Scan"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text admin_label=\"Text\" _builder_version=\"4.19.4\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-security-analysis-header-security-scan.jpg\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"166px||62px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">Security Scans<\/h1>\n<p style=\"text-align: center\">The quick start into your security analysis<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" min_height=\"182.7px\" custom_margin=\"||-30px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" min_height=\"0px\" custom_margin=\"|0px|0px|0px|false|true\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span><span data-contrast=\"auto\" xml:lang=\"DE-DE\" lang=\"DE-DE\" class=\"TextRun SCXW227876731 BCX9\"><span class=\"NormalTextRun SCXW227876731 BCX9\">Your externally accessible systems and applications pose specific threats from cyberattacks. Our security scans provide a quick overview of your security level. Moreover, they help you comply with IT security best practices and provide you with initial answers to potentially existing vulnerabilities. The scan results can also form the starting point for an in-depth, manual review, for example in the form of a <\/span><a href=\"https:\/\/www.usd.de\/security-analysis-pentests\/pentest\/\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW227876731 BCX9\">pentest<\/span><\/a>.<\/span><span class=\"EOP SCXW227876731 BCX9\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"||-50px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"35px|0px|35px|0px|true|true\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2>What Scan Types Does usd AG Offer?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"|auto|-29px|auto||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>System Security Scan<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-40px||-40px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-system-kachel-1.jpeg\" title_text=\"usd-herolab-pentest-system-kachel\" align_tablet=\"\" align_phone=\"\" align_last_edited=\"on|phone\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Our System Security Scans check your internal and external IT systems (such as web servers, mail servers, file servers) for several thousands of vulnerabilities, always in line with the latest research. We use standardised, internationally recognised scanning procedures and base our review of your scan results on renowned security standards.\u00a0<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Scans can be performed externally over the internet (External System Security Scans) or as optional internal scans via a VPN tunnel (Internal System Security Scans). The System Security Scan includes checks for the following vulnerabilities:<\/span><\/p>\n<ul>\n<li>Unencrypted communication<\/li>\n<li>Missing security patches<\/li>\n<li>Use of default settings, such as default passwords<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"30px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" admin_label=\"Teiler\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-30px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Web Application Security Scan<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-40px||-30px||false|false\" custom_padding=\"0px||0px||false|false\" collapsed=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" custom_padding=\"1px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>With our Web Application Security Scans, you check your internet-accessible and internal web applications for weak points and security vulnerabilities. You'd also like to check the web applications \"behind the login\" and thus the area with particularly sensitive data, then you need an authenticated scan. For this, you provide us with access data for a user role in advance. The web application security scan identifies frequently occurring security gaps, including:<\/p>\n<ul>\n<li>Cross-Site Scripting (XSS)<\/li>\n<li>SQL, Command und XPath Injections<\/li>\n<li>Directory und Path Traversal<\/li>\n<li>Security Misconfigurations\u00a0<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-web-application-pentest-1.jpeg\" title_text=\"usd-herolab-web-application-pentest\" align_tablet=\"\" align_phone=\"\" align_last_edited=\"on|phone\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"30px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-30px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Mobile Security Scan<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-40px||-30px||false|false\" custom_padding=\"0px||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/header-usd-cloud-security.jpg\" title_text=\"usd-herolab-mobile-app-pentest\" align_tablet=\"\" align_phone=\"\" align_last_edited=\"on|phone\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>With our Mobile Security Scan we check your mobile applications (e.g. iOS and Android) for known vulnerabilities. The scan consists of a static source code analysis, which is performed offline, and an optional web application security scan of the backend or API.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span data-contrast=\"auto\">Through this scan, your applications will be checked for the following security vulnerabilities, among others:\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Storage of sensitive information in the source code (e.g. API keys or hard-coded passwords)\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Use of outdated signature algorithms\u00a0<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Use of insecure functions (e.g. weak encryption keys)\u00a0<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"30px||||false|false\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-30px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>DNS Security Scan<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-40px||30px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" custom_padding=\"4px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>During a DNS Security Scan, externally or internally accessible DNS servers are analyzed for vulnerabilities and configuration errors.<\/p>\n<p>The DNS Security Scan includes the following checks, among others:<\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span data-contrast=\"auto\"><\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Identification of known and unknown assets (target\/actual comparison)<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Domain and subdomain enumeration using reverse lookups and other techniques<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Testing for DNSSEC zone walking, DNS zone transfers, DNS recursion DDoS, cache snooping, and unauthenticated updating of DNS entries<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Verification of compliance with best practices such as DMARC recodes and DNSSEC<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-kachel-dns-scan.jpg\" alt=\"usd AG, DNS Security Scan \" title_text=\"usd-kachel-dns-scan\" align_tablet=\"\" align_phone=\"\" align_last_edited=\"on|phone\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_padding=\"3px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"30px||||false|false\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" admin_label=\"Teiler\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>PCI Security Scan: Internal Scan and ASV Scan<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-40px||-30px||false|false\" custom_padding=\"||40px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pci-plattform-2.jpeg\" title_text=\"usd-pci-plattform\" align_tablet=\"\" align_phone=\"\" align_last_edited=\"on|phone\" _builder_version=\"4.19.4\" _module_preset=\"default\" min_height=\"51.6px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"1px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Businesses that process, store or forward credit card data must have their IT systems regularly scanned for vulnerabilities to comply with PCI DSS.\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pci-security-services\/pci-security-scans\/\" button_text=\"Go to our PCI Security Scans\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-40px|auto|-30px|auto|false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"30px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>FAQ<\/h2>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_background_color=\"#FFFFFF\" closed_toggle_background_color=\"#FFFFFF\" icon_color=\"#F07F1D\" use_icon_font_size=\"on\" icon_font_size=\"23px\" _builder_version=\"4.19.4\" _module_preset=\"default\" body_font=\"|300|||||||\" body_font_size=\"16px\" custom_margin=\"4px|0px|-1px|0px|false|true\" rank_math_faq_schema=\"on\" border_radii=\"on|5px|5px|5px|5px\" border_color_all=\"#F6F6F6\" box_shadow_style=\"preset1\" box_shadow_spread=\"-11px\" box_shadow_color=\"rgba(0,0,0,0.22)\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_accordion_item title=\"Ihr Titel\" open=\"on\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"What are the phases of a Security Scan?\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.19.4\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p><strong>Planning<\/strong><\/p>\n<p>During the planning phase, we coordinate all relevant information and technical details of the environments to be scanned with you. In addition, depending on the scan type, the time window of the scan is determined.\u00a0If required, we set up the VPN tunnel together with you (for internal scans).<\/p>\n<p><strong>Scan<\/strong><\/p>\n<p>We use a standardized, internationally recognized procedure to check your systems or web applications for relevant security vulnerabilities and anomalies. Detected vulnerabilities are not exploited in the process. This nearly eliminates any risk to the proper operation of your IT systems.<\/p>\n<p><strong>Review<\/strong><\/p>\n<p>One of our IT security experts will review the results of your scan. We base our evaluation of vulnerabilities on international and renowned security standards.<\/p>\n<p><strong>Report<\/strong><\/p>\n<p>Finally, you receive a comprehensive report comprising an Executive Summary and a Technical Report. The criticality of vulnerabilities and their probability of occurrence are highlighted and gives corrective measures.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Where is the service provided?\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.19.4\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p>Depending on the scan type, the service is provided from the offices of usd via the Internet or offline. If internal IT systems and applications are checked, this is done via a secure, encrypted connection. If desired, the service can also be provided on site.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Which scanning methods make sense to combine?\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.19.4\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<h5>System Security Scan &amp; Web Application Scan:<\/h5>\n<p>Hackers attack both the services accessible on an IT system and the web applications running on it. Both scanning services in combination allow a more holistic security overview.<\/p>\n<h5>Web Application Scan &amp; Mobile Security Scan:<\/h5>\n<p>Most mobile applications communicate with web applications or APIs to perform their tasks. Therefore, a comprehensive analysis of the security posture requires as well as testing the mobile application, testing the interfaces with which the mobile application communicates. Hence, the combination of testing the mobile application and the provided APIs is highly recommended.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"How often should scans be performed?\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.19.4\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p>In principle, we recommend that you scan your IT environment on a regular basis in order to be prepared for constantly new attack scenarios.\u00a0Therefore, in addition to the one-time scan, we also offer you annual packages with 4 scans each for quarterly scans. You are free to choose the scanning intervals when you place your order.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Do you provide consulting support?\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.19.4\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p><span>You will not be left alone with the scan result. <a href=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" target=\"_blank\" rel=\"noopener\">Our experts<\/a> will be happy to support you if any questions or problems arise.<\/span><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-30px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>More Insights<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.19.5\" _module_preset=\"default\" custom_margin=\"-40px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.19.4\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-security-analysis-header-security-scan.jpg\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#f6f6f6\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"rgba(0,0,0,0)\" custom_margin=\"30px||-1px||false|false\" custom_padding=\"6px|30px|0px|30px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Security Scan and Pentest: What are the Differences?<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-scan-and-pentest-what-are-the-differences\/\" button_text=\"Go to the article\" button_alignment=\"center\" _builder_version=\"4.19.4\" _module_preset=\"7244f902-5e49-458a-9554-eef332089ce2\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.19.4\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-security-analysis-header-security-scan.jpg\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#f6f6f6\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.5\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"rgba(0,0,0,0)\" custom_margin=\"30px||-1px||false|false\" custom_padding=\"6px|30px|0px|30px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">5 reasons to run a Security Scan <\/span><\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/5-reasons-to-run-a-security-scan\/\" button_text=\"Go to the article\" button_alignment=\"center\" _builder_version=\"4.19.5\" _module_preset=\"7244f902-5e49-458a-9554-eef332089ce2\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Scans The quick start into your security analysisYour externally accessible systems and applications pose specific threats from cyberattacks. Our security scans provide a quick overview of your security level. Moreover, they help you comply with IT security best practices and provide you with initial answers to potentially existing vulnerabilities. The scan results can also [&hellip;]<\/p>\n","protected":false},"author":91,"featured_media":0,"parent":15265,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-34080","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/34080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=34080"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/34080\/revisions"}],"predecessor-version":[{"id":63250,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/34080\/revisions\/63250"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/15265"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=34080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}