RED-Skull
Deep scan for your IT security
Our vulnerability assessment provides you with a targeted analysis of your IT infrastructure. The vulnerability assessment is scope-based and prioritized according to the CVSS standard, so you can immediately see where there is an acute need for action. A structured action plan shows concrete steps to minimize risk. Optionally, we can carry out a re-test to check the effectiveness of the measures. The final management summary summarizes all results clearly and comprehensibly, ideal for internal communication and decision-making.
Features / advantages at a glance
Scope-based
CVSS prioritization
Action plan
Re-test
Management Summary
What you can expect
Our RED-Skull precisely identifies IT vulnerabilities using state-of-the-art technologies and creates both highlight and summary reports. These provide valuable insights into potential security vulnerabilities. Our innovative solution ensures that you are always one step ahead of your IT security. Rely on our expertise for a secure and industry-leading IT environment.
-
Scoping and preparation
Areas and systems are specifically defined to ensure that all processes run smoothly and efficiently. Working closely with the teams, we coordinate the optimal time slots to ensure maximum productivity.
-
Scans
Our scans provide depth at system level without unnecessary intervention. Our solution uses advanced technologies to perform a comprehensive analysis of the IT infrastructure that goes beyond a superficial look. In doing so, we ensure maximum security and minimize risks by identifying potential vulnerabilities before they become real threats.
-
Analysis and prioritization
Finds are assessed and mapped to ensure comprehensive analysis and categorization. Our innovative approach combines state-of-the-art technology with proven methods to ensure that every find is accurately categorized and documented.
RED-Skull delivers tangible results with clear outcomes.
Wide coverage
Prioritized risks
Concrete to-dos
Verified re-test
Technology in detail
Individually tailored:
You define the scope - RIEDEL Networks carries out targeted checks, evaluates findings and classifies them according to urgency and business impact.
Structured approach:
The results are prepared in two reports (Summary & Highlight Report), for clear prioritization and efficient processing.
Technology & context combined:
RED-Skull combines technical analysis with business-relevant classification, understandable for IT and management.
One-off check, lasting effect:
The check creates transparency, helps with the planning of measures and can optionally be supplemented by implementation support.
IT Security
Comprehensive protection
Our overlay solutions offer managed services with 24/7 monitoring, configuration management and incident handling. They are individually tailored to your infrastructure and are optimally prepared for hybrid and multicloud-capable corporate networks.
Pricing
Our RED Skull vulnerability scan is a non-disruptive, automated testing process that thoroughly analyzes your IT infrastructure without interfering with existing systems or disrupting ongoing operations. The scan can be carried out either once a year or every 2, 3, 6 or 12 months, depending on your requirements.
Can also be booked as a service: 1, 2, 3, 6 or 12 scans per year.
Want to take a look at the evaluation?
We'll show you a sample highlight report!
As part of the RED-Skull Vulnerability Assessment, you will receive two different reports from us.
On the one hand, you will receive the so-called highlight report, in which the entire assessment is summarized in an easily understandable way for the management level and the most important findings are clearly explained. This makes it easy for non-IT professionals to understand the urgency and how these security gaps occur.
On the other hand, you receive a detailed reporting document in which all vulnerabilities found are listed according to severity level and described in a way that IT can understand. This allows the vulnerabilities to be systematically closed and the security level of the network to be improved.
Download our highlight report
Take a look at two real-life weak points to see how highlight reporting is structured and what insights lie dormant in it. Download now!
Frequently asked questions
Here are some of the most frequently asked questions we receive.
-
What is included in the scope?
Vulnerability assessment through a scan, manual validation and a prioritized action plan with recommendations on responsibilities and deadlines.
-
How does the vulnerability scan work?
1. dispatch of the preconfigured test kit
2. execution of the scan by our Security Operations Center (SOC)
3. return of the device
4. evaluation of the results
-
How long does the scan take?
Depending on the size and complexity of your network, the scan takes between a few hours and up to a week. The report is then generated within about a week.
-
Does this affect operations?
Scans are coordinated and carried out with as little disruption as possible.
-
How do you prioritize finds?
According to impact, probability of attack and asset criticality (if known).
-
Do you cover cloud and SaaS?
Yes, if interfaces are available; the scope is defined in scoping.
-
Does the RED-Skull Scan also work with microsegmentation?
Yes.
Get started today!
Our Solution Architects will be happy to have an initial discussion with you. When it comes to IT security, one basic rule applies: it's always better to start than to put it off!