- 13
- 41 298
Greenbone AG
Germany
เข้าร่วมเมื่อ 15 เม.ย. 2019
Welcome to the TH-cam channel of Greenbone,
the leading manufacturer of open-source based vulnerability management.
The vulnerability management solutions identify security gaps in corporate IT, assess their risk potential and recommend measures for remediation.
The goal is to prevent cyber attacks through targeted, continuous precautionary measures.
Transparency and quality are important to us. Our customers receive a completely verifiable product "made in Germany" instead of a black box. This is well received even at the highest level: Greenbone also supports German authorities in the fight against cyber attacks.
Since 2020, Greenbone has also been the world's first and only provider of DSGVO-compliant vulnerability management from the cloud.
the leading manufacturer of open-source based vulnerability management.
The vulnerability management solutions identify security gaps in corporate IT, assess their risk potential and recommend measures for remediation.
The goal is to prevent cyber attacks through targeted, continuous precautionary measures.
Transparency and quality are important to us. Our customers receive a completely verifiable product "made in Germany" instead of a black box. This is well received even at the highest level: Greenbone also supports German authorities in the fight against cyber attacks.
Since 2020, Greenbone has also been the world's first and only provider of DSGVO-compliant vulnerability management from the cloud.
Was Sie zu NIS2 wissen müssen
Die Deadline für die Umsetzung der europäischen NIS2-Richtlinie rückt näher - zum 17.10.2024 sollen verschärfte Cybersicherheitsmaßnahmen in Deutschland über das „NIS2 Umsetzungs- und Cybersicherheitsstärkungsgesetz“ (NIS2UmsuCG) ins Recht überführt werden. Dieses liegt bisher als Gesetzesentwurf vor, welcher sich an der EU Richtlinie 2022/2555 orientiert. Die Richtlinie haben wir für Sie unter die Lupe genommen, um Ihnen in einem kurzen Video die wichtigsten Anhaltspunkte und Wegweiser für das Inkrafttreten von NIS2 an die Hand zu geben. Ob Ihr Unternehmen betroffen ist, welche Maßnahmen Sie unbedingt ergreifen sollten, welche Aspekte der Cybersicherheit Sie besonders bedenken müssen, wen Sie konsultieren können und welche Konsequenzen drohen, wenn Sie sich nicht daran halten, erfahren sie in diesem Video.
NIS2 EU-Richtlinie:
eur-lex.europa.eu/legal-content/DE/TXT/?uri=CELEX:32022L2555
EU-Empfehlung zur Klassifizierung von Unternehmensgrößen:
eur-lex.europa.eu/legal-content/DE/TXT/?uri=celex%3A32003H0361
BSI zu ISO Zertifizierung:
www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Zertifizierung-und-Anerkennung/Zertifizierung-von-Managementsystemen/ISO-27001-Basis-IT-Grundschutz/iso-27001-basis-it-grundschutz_node.html
ENISA Common Criteria:
www.enisa.europa.eu/topics/certification/cybersecurity-certification-framework
Cyber Resilience Act:
www.greenbone.net/cyber-resilience-act/
NIS2 EU-Richtlinie:
eur-lex.europa.eu/legal-content/DE/TXT/?uri=CELEX:32022L2555
EU-Empfehlung zur Klassifizierung von Unternehmensgrößen:
eur-lex.europa.eu/legal-content/DE/TXT/?uri=celex%3A32003H0361
BSI zu ISO Zertifizierung:
www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Zertifizierung-und-Anerkennung/Zertifizierung-von-Managementsystemen/ISO-27001-Basis-IT-Grundschutz/iso-27001-basis-it-grundschutz_node.html
ENISA Common Criteria:
www.enisa.europa.eu/topics/certification/cybersecurity-certification-framework
Cyber Resilience Act:
www.greenbone.net/cyber-resilience-act/
มุมมอง: 281
วีดีโอ
What you need to know about NIS2
มุมมอง 3312 หลายเดือนก่อน
The deadline for the implementation of the European NIS2 Directive is approaching - by October 17, 2024, stricter cybersecurity measures are to be transposed into law in Germany via the “NIS2 Implementation and Cybersecurity Strengthening Act” (NIS2UmsuCG). This is currently available as a draft law, which is based on EU Directive 2022/2555. Other member states will follow similar procedures. W...
Demystifying Greenbone
มุมมอง 8637 หลายเดือนก่อน
Why are there so many complicated terms surrounding Greenbone? How does our vulnerability management system work? What do the components do? And how do they interact? We believe that everybody should be able to understand cyber security. Greenbone's Joseph answers these questions and more in this video to give you some condensed insider knowledge in a digestible format. Find us at: Community: w...
Setting up and Configuring Filters in Greenbone
มุมมอง 1.2K11 หลายเดือนก่อน
Filters can be tricky, but using them can get you better results. In this video Joseph from the Greenbone Community shows you how to get familiar with them. Greenbone Manual Filter Section docs.greenbone.net/GSM-Manual/gos-22.04/en/web-interface.html#filtering-the-page-content Power Filter Examples docs.greenbone.net/GSM-Manual/gos-22.04/en/web-interface.html#examples-for-powerfilters Filter an...
Find out more about penetration testing services for web applications.
มุมมอง 634ปีที่แล้ว
Hello, attacks on web applications are constantly on the increase, and it's essential to take steps to protect your business. Greenbone, certified with ISO 27001 und ISO 9001, helps you to reduce the risk of successful cyber attacks and assures you to meet with your compliance guidelines. Corentin Bardin, lead penetration tester at Greenbone, introduces you to our penetration testing services f...
Setting up and Running your First Scan quickly with Greenbone Community Edition
มุมมอง 15Kปีที่แล้ว
Hello! Joseph from the Greenbone community walks you through getting started using the Greenbone Community Edition vulnerability scanner. In this video you'll be logging in and starting a first scan, using the scan wizard to scan a local network IP and go over basic scan report formatting and other features. If you still need to install the Greenbone Community Edition, we recommend using our Do...
Installing the Greenbone Community Edition from Docker Containers
มุมมอง 8Kปีที่แล้ว
Debut of the Greenbone Community series, as Joseph from the Greenbone Community walks you through the process of installing the Greenbone Community Edition using Docker containers. Questions or comments? Find us at: Greenbone Community Forum: forum.greenbone.net/ Fediverse: (Mastodon) floss.social/@greenbone More information and documentation is at: greenbone.github.io/docs/latest/22.4/containe...
Über Greenbone
มุมมอง 1.5K2 ปีที่แล้ว
Vorstellung der Technologie, auf der alle Greenbone Enterprise Appliances und der Greenbone Cloud Service basieren.
About Greenbone
มุมมอง 10K2 ปีที่แล้ว
Presentation of the technology on which all Greenbone Enterprise Appliances and the Greenbone Cloud Service are based.
Greenbone AG: Company, Technology and Products
มุมมอง 1.4K2 ปีที่แล้ว
Greenbone corporate video. Presentation of the company, the technology, open source based vulnerability management, and presentation of the products: Greenbone Enterprise Appliances and Greenbone Cloud Service.
EuGH Urteil kippt Privacy Shield - Webinar zur DSGVO Konformität
มุมมอง 1433 ปีที่แล้ว
Nach dem Ende des transatlantischen Privacy Shield Abkommens herrscht große Verunsicherung bei Unternehmen. Welche Regeln gelten jetzt zwischen der EU und Drittstaaten und insbesondere den USA. Nach Safe Harbor ist das nun das zweite Abkommen, das durch den EuGH und das sogenannt Schrems II Urteil gekippt wurde. Dieser fordert nun neue Instrumente für internationale Datentransfer. Unser Webinar...
Cloud Produkte und Privacy Shield - Webinar zur DSGVO Konformität
มุมมอง 4833 ปีที่แล้ว
Nach dem Ende des transatlantischen Privacy Shield Abkommens herrscht große Verunsicherung bei Unternehmen. Welche Regeln gelten jetzt zwischen der EU und Drittstaaten und insbesondere den USA. Nach Safe Harbor ist das nun das zweite Abkommen, das durch den EuGH und das sogenannt Schrems II Urteil gekippt wurde. Dieser fordert nun neue Instrumente für internationale Datentransfer. Das ganze Web...
Very nicely explained. The default config set being in the user>settings is a bit tedious to find but understandable.
Excellent information, thank you!
@greenbone I know you're a real one because your demo desktop clock shows near 24:00. Awesome software. Just started to learn about it last week.
I really needed this. Thank you so much!
You are welcome! For more news on NIS2 and the world of open source cyber security feel free to check out our blog! The final link in the description will take you there. ;)
We need more videos like this! Thanks!!!
We're glad you found our video helpful! New videos are always in the making and in the meantime you can find more on NIS2 and recent cyber security news like the CrowdStrike outage on our blog!
Thats very interesting, thank you for the content!
You are welcome! Visit our blog for more news on similar topics. :)
Is there a complete list of all products supported by the scanner?
When I want to start a scan I get this error: Failed to find config 'daba56c8-73ec-11df-a475-002264764cea'
did you really watch this video?
when i run the task wizard through the ip it was through the error like port not listed
cool
how can i acess via web from another windows pc in the network? :(
After following the tutorial step by step, the webinterface does not work despite market as running
Nice & clear summary, thanks
Is there a way to group assets based on their departments? For example, I have 5 machines for the Core team and 10 for the Systems team. How can I run scan(schedule scan) for all the systems team at once and get a common report
@@isaeahvus Thanks but can I also divide assets into groups? Like instead of providing all the IPs belonging to one group, I simply mention the name of that group in the scan task.
@@pakhack_pk yes whenever you create a scan you must specify a target. that target can be specified right then in ip or dns terms like a range or comma seperated IPs,, subnets, masks and dns names or a textfile vs csv with the list of hosts tou can upload into Target subdiaglog that comes up oncreating a new scan. Or you can reference any one of the targets you have defined in any of the above ways in any prior scans, as well targets you may have defined without assigning a scan to them (for future use) under the targets menu. each object like that can be defined and saved seperately, whether its Targets, Ports List, Scanner Profiles/ Configurations / Credential sets for credential scans, users , notes, filters, reports, tickets, overrides, hosts, etc.etc.
der produkt bleibt immer cool 👍🏻😀👨💻
sowieso