Cybersecurity-Scanner
Be aware of Cyber Incidents
True to the motto „Solutions by Technology“, solbytech develops tailor-made software solutions for various use cases.
The cybersecurity scanner is the company’s latest innovation. As a powerful tool for preventing security gaps, it protects against potential attacks on decentralized networks.
- Secure in handling the data
- Inexpensive to purchase
- Easy to use
Secure
in handling the data
Inexpensive
to purchase
Easy
to use
Efficient risk management
The cybersecurity scanner from solbytech supports companies in the risk management of their systems and provides a structured insight into the weak points. For more security and more efficient handling in error management.
Central Management
of the application through cloud monitoring
Clear categorization
& classification of security risks
Insightful localization
of the vulnerability for troubleshooting
Notification
Notification of current and emerging security risks
How does it work?
The cybersecurity scanner supports company security officers significantly in their work: the collected processing and categorization of security vulnerabilities in just one user interface provides an overview and makes it easier to intervene in potential dangers.
Furthermore, an easily accessible possibility for inspection is offered, which can be carried out regularly.
Scanning of the systems and facilities
for security risks and possible vulnerabilities
Localization
and definition of the faulty ports using CVE links
Categorization and classification of the results
using a four-point scale (low, medium, high, critical)
The Interface
Step by step – from large to small – the user of the interface is taken along by the general state of the system, via the individual hosts to the ports with the error codes. With this approach, clarity can be maintained and the current status can be assessed quickly.
Classification of the security warning level for the individual ports including a detailed breakdown of the vulnerability based on a dedicated CVE error source as an external link
List of open ports that are not a dedicated vulnerability, but still represent a security risk.
Legal Framework
Various legal regulations play an increasingly important role for companies in the critical infrastructure. In addition to the personal commitment to keeping the systems in a safe condition, more and more legally anchored regulations have to be observed. This includes the following two sets of rules:
Policy NIS 2
As part of the trilogue negotiations of the European Parliament, new guidelines relating to the cyber security of networks and information systems (NIS2) were adopted in 2022. The digital security standards of asset management have been tightened by law and fines increased.
Companies are now responsible for integrating cyber security as a management obligation – there is a great need for action, especially in the areas of PV systems, charging infrastructure, wind energy and smart cities
IT Security Act
The Federal Office for Civil Protection and Disaster Assistance obliges operators of critical infrastructures to the so-called IT Security Act. This is to prevent incidents that have a significant impact on health, safety, or economic and social well-being. KRITIS operators must be able to maintain their operational systems at high standards and ensure information security.
Areas of Application
As already mentioned, companies in the field of critical infrastructure are under pressure to permanently comply with (partly new) legislation. The sources of danger are spread across large parts of the corporate infrastructure and require constant assessment.




Wind Energy
Photovoltaic ground-mounted systems
SmartCity
Charging Infrastructure
Integration
Effortless implementation is ensured: The cybersecurity scanner can be connected to the systems from any location and is therefore suitable for rapid implementation. The primary focus is on the app for Teltonika – there is also the possibility of integration via systems that support Docker containers.
App for Tektonik Router
Docker Container