- Knowledge base
- General
- Vulnerability tests
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
What are the sources for the vulnerability tests?
In order to provide our customers with one of the market's widest coverage of vulnerabilities, we work with several methods to create new tests. There are two main sources for the vulnerability tests:
- Our Security Research Team
The in-house Security Research Team constantly monitors new threats from public feeds and sources, as well as the different vendors. Based on this information, new vulnerability tests are created continuously. - Public feeds
Integrations with public feeds, where the community creates new vulnerability tests. Our security research team verifies and quality-checks all tests from this source.
Phishing templates and awareness training programs
Our Security Research team also continuously creates new phishing templates and awareness programs.