{"id":33882,"date":"2023-02-06T13:46:20","date_gmt":"2023-02-06T12:46:20","guid":{"rendered":"https:\/\/www.usd.de\/?p=33882"},"modified":"2023-03-13T08:12:07","modified_gmt":"2023-03-13T07:12:07","slug":"5-reasons-to-run-a-security-scan","status":"publish","type":"post","link":"https:\/\/www.usd.de\/en\/5-reasons-to-run-a-security-scan\/","title":{"rendered":"5 reasons to run a Security Scan\u00a0"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>Sebastian D\u00fcringer<\/strong>, Senior Consultant at <a href=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" rel=\"noreferrer noopener\">usd HeroLab<\/a> and responsible for our <a href=\"https:\/\/www.usd.de\/en\/security-analysis-pentests\/security-scan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Scans<\/a> , explains why Security Scans are an excellent introduction to the world of IT security analysis and why they should be an essential part of sustainable vulnerability management.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-scans-zitat-sd.jpg\" alt=\"\" class=\"wp-image-33645\" width=\"172\" height=\"172\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" class=\"wp-image-33858\" style=\"width: 32px\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-Security-002-1.png\" alt=\"\"> Easy Introduction to The Field of IT Security&nbsp;<\/h2>\n\n\n\n<p>Especially systems and applications accessible from the Internet become the focus of criminal hackers. Known security vulnerabilities in applications, such as web server configuration problems or the use of outdated software versions with, in the worst case, already known vulnerabilities, pose a risk to your company and can be identified with the help of a scan. Security scans are relatively quick and inexpensive to implement.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" class=\"wp-image-33861\" style=\"width: 32px\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-Security-003-1.png\" alt=\"\"> Compliance with Regulatory Requirements&nbsp;<\/h2>\n\n\n\n<p>An increasing number of regulations, standards and norms require technical security assessments. For example, if your company falls within the scope of <a href=\"https:\/\/www.usd.de\/en\/pci-security-services\/pci-dss\/\" target=\"_blank\" rel=\"noreferrer noopener\">PCI DSS<\/a>, you can fulfill requirement 11.3.2 (v4.0) by performingn <a href=\"https:\/\/www.usd.de\/en\/pci-security-services\/pci-security-scans\/\" target=\"_blank\" rel=\"noreferrer noopener\">ASV Scans<\/a> and requirement 11.3.1 (v4.0) by performingn <a href=\"https:\/\/www.usd.de\/en\/pci-security-services\/pci-security-scans\/\" target=\"_blank\" rel=\"noreferrer noopener\">internal PCI DSS Scans<\/a>.\u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" class=\"wp-image-33866\" style=\"width: 32px\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-Dokument-005.png\" alt=\"\"> Well Comparable Results<\/h2>\n\n\n\n<p>Security scans are performed periodically, at best quarterly. The cycle of significant changes, such as the installation of new software or major changes to your infrastructure, is typically annual or further into the future. This allows you to capture ongoing metrics for evaluation by your IT security organization, making comparisons possible.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" class=\"wp-image-33870\" style=\"width: 32px\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-Dokument-007.png\" alt=\"\"> Relevant for a Sustainable Vulnerability Management.&nbsp;&nbsp;<\/h2>\n\n\n\n<p>By conducting security scans on a regular basis, the learning curve of your vulnerability management increases: The comparability and the trends that can be read from them make forecasts possible. In addition, your experience in dealing with vulnerabilities increases over time and your IT security awareness is sharpened.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>&nbsp;<br>Ideally, you should supplement your vulnerability management with an in-depth technical analysis in the form of a <a href=\"https:\/\/www.usd.de\/en\/security-analysis-pentests\/pentest\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentest<\/a>. Learn more about the differences between a pentest and a security scan <a href=\"http:\/\/www.usd.de\/en\/security-scan-and-pentest-what-are-the-differnences\/\" target=\"_blank\" data-type=\"URL\" data-id=\"http:\/\/www.usd.de\/en\/security-scan-and-pentest-what-are-the-differnences\/\" rel=\"noreferrer noopener\">here<\/a>. In addition, <a href=\"https:\/\/www.usd.de\/en\/security-analysis-pentests\/vulnerability-management-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability management<\/a> can provide you with targeted support, for example with regard to the structured handling of numerous vulnerabilities.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" class=\"wp-image-33875\" style=\"width: 32px\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-Tool-007.png\" alt=\"\"> Easy Scalability<\/h2>\n\n\n\n<p>Once security scans are firmly implemented and established in your company, you can adapt the scope of the security scans, i.e. the systems or applications to be tested, as required. Thus, you can easily include an extension or modification of your IT infrastructure in the scope of the scans.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>Would you like more information about our <a href=\"https:\/\/www.usd.de\/en\/security-analysis-pentests\/security-scan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Scans&nbsp;<\/a> or do you need support? Please feel free to <a href=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" target=\"_blank\" rel=\"noreferrer noopener\">contact us!<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sebastian D\u00fcringer, Senior Consultant at usd HeroLab and responsible for our Security Scans , explains why Security Scans are an excellent introduction to the world of IT security analysis and why they should be an essential part of sustainable vulnerability management. Easy Introduction to The Field of IT Security&nbsp; Especially systems and applications accessible from [&hellip;]<\/p>\n","protected":false},"author":112,"featured_media":33637,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[373],"tags":[413,2606,445,477,3985,487,3986,4010],"class_list":["post-33882","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","tag-cyber-security-en","tag-it-security-3","tag-it-sicherheit-en","tag-pci-security-scans-en","tag-schwachstellenscan-en","tag-security-analysis-en","tag-security-scan-en","tag-vulnerability-scan"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/33882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=33882"}],"version-history":[{"count":0,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/33882\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/33637"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=33882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/categories?post=33882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/tags?post=33882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}