Vulnerability Scan

Our vulnerability assessment identifies, quantifies and prioritizes the vulnerabilities of systems, using both system and application vulnerability scans. The vulnerability scans are semi-automated processes that will check whether patches or updates have been installed, bugs removed and systems securely configured. Our team will carefully review the results to sift out false positives to check whether a vulnerability really exists – and whether action needs to be taken.

Carried out by Experts

Instead of a purely automated scan you are booking our experts that support the evaluation of the scan results.

Manual Verification

Potential weaknesses are manually verified by experienced professionals to reduce false positives and save your time.

Your Personal Contact

Your assigned personal contact will guide you through the process and answer any questions you might have.

Attractive Offers

Different price-effective variants,  tailored to your needs and size of your company. Ask for an individual offer.


Choose your favorite or let us create a tailored package for you.


One-time assessment


(excl. VAT)

  • Infrastructure Scan
  • Application Scan
  • Prioritisation and Scoring
  • Vulnerability Assessment Report
  • Up to 16 Systems

Basic Subscription

Quarterly basic assessment

2999  / Year

(excl. VAT)

  • Infrastructure and Application Scan
  • Prioritisation and Scoring
  • Vulnerability Assessment Report
  • Up to 16 Systems
  • 4 Times a Year

Contact us now!

Please enter your email address and desired start date for the assessment below.

    OSM Solutions GmbH may collect and use your personal data which you have provided in this form, for providing marketing material that you have agreed to receive, in accordance with our data protection policy. Please tick the box below if you agree.

    How does the scan actually work?

    Our vulnerability assessment is a semi-automated test that looks for weaknesses in the systems you expose to the outside world. Security vulnerabilities in software or misconfiguration of the operating system are examples of issues that can be used to gain access to your systems. Software will regularly get fixed by the vendors through patches, but not necessarily installed or updated in time before attackers notice. Misconfiguration of security settings would remain undetected until exploited. We verify whether those issues have been addressed and the systems are up-to-date.

    The outcome of the vulnerability assessment is documented in the form of a report which contains a summary of the high-risk vulnerabilities, visually depicting the overall threat level and a full list of all findings, including technical details and recommendations. This report can be used by management to get an overview of the security posture of the IT environment and represents the basis for technicians to address the identified risks.