Technical underpinning of risk analysis: vulnerability scans and data analysis
If necessary, we supplement the manual risk analysis with automated vulnerability scans of your IT landscape or by evaluating existing information. The aim is to identify potential vulnerabilities in systems and applications at an early stage and to provide well-founded technical findings for the workshops.
Modern vulnerability scanners scan your systems for known vulnerabilities and prioritize them based on their severity level.
Optional: With Microsoft Purview, you gain structured insights into data classifications, flows, and potential data protection and compliance risks — for a quick overview of your attack surface and targeted measures at critical points.
The results flow directly into the Risk & Threat Report and supplement the assessments from the workshops with data-based facts