solbytech_black

Cybersecurity-Scanner

Be aware of Cyber Incidents

True to the motto „Solutions by Technology“, solbytech develops tailor-made software solutions for various use cases.

The cybersecurity scanner is the company’s latest innovation. As a powerful tool for preventing security gaps, it protects against potential attacks on decentralized networks.

  • Secure in handling the data
  • Inexpensive to purchase
  • Easy to use

Secure
in handling the data

Inexpensive
to purchase

Easy
to use

Efficient risk management​

The cybersecurity scanner from solbytech supports companies in the risk management of their systems and provides a structured insight into the weak points. For more security and more efficient handling in error management.

Central Management

of the application through cloud monitoring

Clear categorization

& classification of security risks

Insightful localization

of the vulnerability for troubleshooting

Notification

Notification of current and emerging security risks

How does it work?

The cybersecurity scanner supports company security officers significantly in their work: the collected processing and categorization of security vulnerabilities in just one user interface provides an overview and makes it easier to intervene in potential dangers.

Furthermore, an easily accessible possibility for inspection is offered, which can be carried out regularly.

Scanning of the systems and facilities

for security risks and possible vulnerabilities

Localization

and definition of the faulty ports using CVE links

Categorization and classification of the results

using a four-point scale (low, medium, high, critical)

Critical
High
Medium
Low
Neutral

The Interface

Step by step – from large to small – the user of the interface is taken along by the general state of the system, via the individual hosts to the ports with the error codes. With this approach, clarity can be maintained and the current status can be assessed quickly.

Number of Vulnerabilities

Brief summary of all vulnerabilities discovered during the scan of the asset(s).

Vulnerabilities per HOst

Assignment to the hosts of the system.

Details of Host

Classification of the security warning level for the individual ports including a detailed breakdown of the vulnerability based on a dedicated CVE error source as an external link

Open Ports

List of open ports that are not a dedicated vulnerability, but still represent a security risk.

+ + + BE AWARE OF LEGAL REGLEMENTATIONS + + +

Legal Framework​

Various legal regulations play an increasingly important role for companies in the critical infrastructure. In addition to the personal commitment to keeping the systems in a safe condition, more and more legally anchored regulations have to be observed. This includes the following two sets of rules:

Policy NIS 2

As part of the trilogue negotiations of the European Parliament, new guidelines relating to the cyber security of networks and information systems (NIS2) were adopted in 2022. The digital security standards of asset management have been tightened by law and fines increased.
Companies are now responsible for integrating cyber security as a management obligation – there is a great need for action, especially in the areas of PV systems, charging infrastructure, wind energy and smart cities

IT Security Act

The Federal Office for Civil Protection and Disaster Assistance obliges operators of critical infrastructures to the so-called IT Security Act. This is to prevent incidents that have a significant impact on health, safety, or economic and social well-being. KRITIS operators must be able to maintain their operational systems at high standards and ensure information security.

Areas of Application

As already mentioned, companies in the field of critical infrastructure are under pressure to permanently comply with (partly new) legislation. The sources of danger are spread across large parts of the corporate infrastructure and require constant assessment.

Wind Energy

Photovoltaic ground-mounted systems

SmartCity

Charging Infrastructure

Integration

Effortless implementation is ensured: The cybersecurity scanner can be connected to the systems from any location and is therefore suitable for rapid implementation. The primary focus is on the app for Teltonika – there is also the possibility of integration via systems that support Docker containers.

App for Tektonik Router

Docker Container