{"id":47604,"date":"2022-10-13T19:49:17","date_gmt":"2022-10-13T17:49:17","guid":{"rendered":"https:\/\/cyberant.com\/vulnerability-management\/"},"modified":"2024-08-13T14:27:34","modified_gmt":"2024-08-13T12:27:34","slug":"vulnerability-management","status":"publish","type":"page","link":"https:\/\/cyberant.com\/en\/vulnerability-management\/","title":{"rendered":"Vulnerability Management"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jwnz0j7-cd30b39a21d84c91ce5ac8e667955e8b\">\n.avia-section.av-jwnz0j7-cd30b39a21d84c91ce5ac8e667955e8b{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/08\/Cyber-Security-Experts6-scaled.jpg);\nbackground-position:50% 50%;\nbackground-attachment:fixed;\nmargin-top:0px;\nmargin-bottom:0px;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-jwnz0j7-cd30b39a21d84c91ce5ac8e667955e8b main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch avia-bg-style-fixed container_wrap sidebar_right'  data-section-bg-repeat='stretch'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47604'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-jk2lfdf-94542888cc58fe144a276d2cc46f93ef sc-av_one_half av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jk2lfdf-94542888cc58fe144a276d2cc46f93ef\">\n.flex_column.av-jk2lfdf-94542888cc58fe144a276d2cc46f93ef{\npadding:30px 30px 30px 30px;\nbackground-color:#f4f4f4;\n}\n<\/style>\n<div  class='flex_column av-jk2lfdf-94542888cc58fe144a276d2cc46f93ef av_one_half  avia-builder-el-1  el_before_av_one_half  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-top  '     ><section  class='av_textblock_section av-izxsbir-406b5e5d6f419f92998e335467e43e28 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Vulnerability Management<\/h2>\n<p>Nothing is more subject to change than online infrastructures.<\/p>\n<p>Databases, software, operating systems and network components are exposed daily to vulnerabilities that can harm businesses and individuals in many ways. One way to gain insight into these vulnerabilities and respond to them intelligently is vulnerability management. <strong>Literally: managing these vulnerabilities.<\/strong><\/p>\n<p>Good vulnerability management helps make your organization more secure. Because if vulnerabilities are identified in time, it is easy to fix them and thus limit or even prevent the unpleasant consequences, such as a hack or hostage-taking of your business. Our team is happy to help you understand your cyber risks.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lezorq8b-527724b74e104a634b9eb08e3a99818c-wrap avia-button-left  avia-builder-el-3  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lezorq8b-527724b74e104a634b9eb08e3a99818c\">\n#top #wrap_all .avia-button.av-lezorq8b-527724b74e104a634b9eb08e3a99818c{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\nborder-style:none;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 20px 0;\n}\n#top #wrap_all .avia-button.av-lezorq8b-527724b74e104a634b9eb08e3a99818c:hover{\nbackground-color:#222222;\ncolor:white;\nopacity:1;\ntransition:all 0.4s ease-in-out;\n}\n<\/style>\n<a href='https:\/\/cyberant.com\/en\/vulnerability-management-netcaptain\/'  class='avia-button av-lezorq8b-527724b74e104a634b9eb08e3a99818c av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Read more about NetCaptain\"><span class='avia_iconbox_title' >Read more about NetCaptain<\/span><span class='avia_button_icon avia_button_icon_right' aria-hidden='true' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello'><\/span><\/a><\/div><\/p><\/div><div class='av-flex-placeholder'><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-i7blzhv-134a7560f5738afd16c07aa60388ac26\">\n.flex_column.av-i7blzhv-134a7560f5738afd16c07aa60388ac26{\npadding:20px 40px 20px 40px;\nbackground-color:#333333;\n}\n<\/style>\n<div  class='flex_column av-i7blzhv-134a7560f5738afd16c07aa60388ac26 av_one_half  avia-builder-el-4  el_after_av_one_half  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-261jeoj-32cd42d341ad606511114b995753eb99\">\n.iconbox.av-261jeoj-32cd42d341ad606511114b995753eb99 .iconbox_icon{\nbackground-color:#55bfa8;\n}\n#top #wrap_all .iconbox.av-261jeoj-32cd42d341ad606511114b995753eb99 .iconbox_content_title{\nfont-size:30px;\ncolor:#55bfa8;\n}\n<\/style>\n<article  class='iconbox iconbox_top av-261jeoj-32cd42d341ad606511114b995753eb99  avia-builder-el-5  el_before_av_hr  avia-builder-el-first  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: NetCaptain\"><div class=\"iconbox_icon heading-color\" aria-hidden='true' data-av_icon='\ue824' data-av_iconfont='entypo-fontello'><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >NetCaptain<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>Europe&#8217;s best vulnerability management tool<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1618b8z-1b52eb88a478ea7fa97cca0fc4807cf4\">\n#top .hr.hr-invisible.av-1618b8z-1b52eb88a478ea7fa97cca0fc4807cf4{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-1618b8z-1b52eb88a478ea7fa97cca0fc4807cf4 hr-invisible  avia-builder-el-6  el_after_av_icon_box  el_before_av_animated_numbers  av-medium-hide av-small-hide av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-krys01f-609f7fc3208dfd1a6f171362deda3aa3\">\n@keyframes av_sonarEffect_av-krys01f-609f7fc3208dfd1a6f171362deda3aa3 {\n  0% {opacity: 0.3;}\n 40% {opacity: 0.5; box-shadow: 0 0 0 2px rgba(255,255,255,0.1), 0 0 10px 10px #ffffff, 0 0 0 10px rgba(255,255,255,0.5);}\n100% {opacity: 0; box-shadow: 0 0 0 2px rgba(255,255,255,0.1), 0 0 10px 10px #ffffff, 0 0 0 10px rgba(255,255,255,0.5); transform: scale(1.5);}\n}\n#top .avia-animated-number.av-krys01f-609f7fc3208dfd1a6f171362deda3aa3 .avia-animated-number-title{\nfont-size:60px;\ncolor:#55bfa8;\n}\n#top .avia-animated-number.av-krys01f-609f7fc3208dfd1a6f171362deda3aa3 .avia-animated-number-content{\ncolor:#444444;\n}\n.avia-animated-number.av-krys01f-609f7fc3208dfd1a6f171362deda3aa3 .avia-animated-number-circle-inner{\nborder-style:none;\nbox-shadow:none;\n}\n.avia-animated-number.av-krys01f-609f7fc3208dfd1a6f171362deda3aa3.avia-sonar-shadow:hover .avia-animated-number-circle-inner:after{\nanimation:av_sonarEffect_av-krys01f-609f7fc3208dfd1a6f171362deda3aa3 1s ease-in-out;\n}\n<\/style>\n<div  class=\"avia-animated-number av-krys01f-609f7fc3208dfd1a6f171362deda3aa3 av-force-default-color avia_animate_when_visible  avia-builder-el-7  el_after_av_hr  el_before_av_hr  avia-color-font-custom avia-sonar-shadow \" data-timer=\"3000\"><strong class=\"heading avia-animated-number-title\"><span class=\"avia-single-number __av-single-number\" data-number_format=\".\" data-number=\"150000\" data-start_from=\"0\">150000<\/span><\/strong><div class=\"avia-animated-number-content\"><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3qgyeqb-13979270be825160f2746d4676490edd\">\n#top .hr.hr-invisible.av-3qgyeqb-13979270be825160f2746d4676490edd{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-3qgyeqb-13979270be825160f2746d4676490edd hr-invisible  avia-builder-el-8  el_after_av_animated_numbers  el_before_av_textblock  av-medium-hide av-small-hide av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcy24fn-6b9b58e3a61d93bdfad2cf7a164a9b78\">\n#top .av_textblock_section.av-kcy24fn-6b9b58e3a61d93bdfad2cf7a164a9b78 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-kcy24fn-6b9b58e3a61d93bdfad2cf7a164a9b78 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h2 style=\"text-align: center;\">unique vulnerabilities detected<\/h2>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-tao94j-4c7b75093fe5a08251c27a6c495eba81\">\n#top .hr.hr-invisible.av-tao94j-4c7b75093fe5a08251c27a6c495eba81{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-tao94j-4c7b75093fe5a08251c27a6c495eba81 hr-invisible  avia-builder-el-10  el_after_av_textblock  el_before_av_textblock  av-medium-hide av-small-hide av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-he7mshf-8e849bc79eadab5d8f7a2a82f2844109\">\n#top .av_textblock_section.av-he7mshf-8e849bc79eadab5d8f7a2a82f2844109 .avia_textblock{\ncolor:#ffffff;\ntext-align:left;\n}\n<\/style>\n<section  class='av_textblock_section av-he7mshf-8e849bc79eadab5d8f7a2a82f2844109 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: left;\">\u2713 Proprietary dashboard<\/p>\n<p style=\"text-align: left;\">\u2713 Real-time visibility into the security of all systems<\/p>\n<p style=\"text-align: left;\">\u2713 Quickly responding to vulnerabilities<\/p>\n<p style=\"text-align: left;\">\u2713 Every system in your organization under control<\/p>\n<p>\u2713 Network security management<\/p>\n<p style=\"text-align: left;\">\u2713 Weaknesses analyzed? We are happy to help you!<\/p>\n<\/div><\/section><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-370z88-324dacc09d0f411290987acbdef7d1f2\">\n.avia-section.av-370z88-324dacc09d0f411290987acbdef7d1f2{\nbackground-color:#ededed;\nbackground:linear-gradient( to bottom, #ededed, #ffffff );\nmargin-top:0px;\nmargin-bottom:20px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-370z88-324dacc09d0f411290987acbdef7d1f2 alternate_color avia-section-default avia-no-border-styling  avia-builder-el-12  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47604'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzse7giv-7d5a42772950a626cf6a45bdff795339\">\n#top .hr.hr-invisible.av-lzse7giv-7d5a42772950a626cf6a45bdff795339{\nheight:33px;\n}\n<\/style>\n<div  class='hr av-lzse7giv-7d5a42772950a626cf6a45bdff795339 hr-invisible  avia-builder-el-13  el_before_av_one_full  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div  class='flex_column av-116gei0-543f86cb523552d84545997dd829aa60 av_one_full  avia-builder-el-14  el_after_av_hr  el_before_av_one_full  first flex_column_div  '     ><section  class='av_textblock_section av-zn58eg-34819df1562a037a22ae6bc32a7c029f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Why vulnerability management?<\/h2>\n<p>Imagine you choose to conduct an annual penetration test to assess your online and offline security. This can certainly provide valuable insights that lead to smart improvements. However, a penetration test is, and will always be, a snapshot in time. By using the right tools, you can stay informed 24\/7 about potential security risks across your entire network.<\/p>\n<p>A good vulnerability management program combines threat intelligence with knowledge of IT and business operations to prioritize and address the risks of cyber vulnerabilities. By analyzing these risks and determining the appropriate next steps, you maintain full control over the security of all your systems.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-23jxtk-5351e5988400f315e997683c67c35dc8-wrap avia-button-left  avia-builder-el-16  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-23jxtk-5351e5988400f315e997683c67c35dc8\">\n#top #wrap_all .avia-button.av-23jxtk-5351e5988400f315e997683c67c35dc8{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\nborder-style:none;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 20px 0;\n}\n#top #wrap_all .avia-button.av-23jxtk-5351e5988400f315e997683c67c35dc8:hover{\nbackground-color:#222222;\ncolor:white;\nopacity:1;\ntransition:all 0.4s ease-in-out;\n}\n<\/style>\n<a href='https:\/\/cyberant.com\/en\/contact\/'  class='avia-button av-23jxtk-5351e5988400f315e997683c67c35dc8 av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'   aria-label=\"Contact\"><span class='avia_iconbox_title' >Contact<\/span><span class='avia_button_icon avia_button_icon_right' aria-hidden='true' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello'><\/span><\/a><\/div><\/p><\/div><div class='flex_column_table av-23z5ns-51b16d99d5c26a3da8259f200632d19f sc-av_one_full av-equal-height-column-flextable'><div  class='flex_column av-23z5ns-51b16d99d5c26a3da8259f200632d19f av_one_full  avia-builder-el-17  el_after_av_one_full  avia-builder-el-last  first flex_column_table_cell av-equal-height-column av-align-bottom  column-top-margin'     ><section  class='av_textblock_section av-lezoqqby-ef2b901cdc1bc7fd9db3ae6ae38670be '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2><span style=\"color: #000000;\">Vulnerability scanner<\/span><\/h2>\n<p>A vulnerability scanner is an effective tool that allows you to automatically check the security of an online infrastructure. CyberAnts NetCaptain combines various (scanning) systems to detect as many vulnerabilities as possible. NetCaptain&#8217;s risk-based approach uses the risk level of these vulnerabilities as a starting point, focusing on detection and prevention. Unlike hiring an ethical hacker, this tool provides continuous insight into your security status, allowing you to intervene promptly in case of security risks. This way, you prevent hackers from exploiting these weaknesses.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-lmq3bbej-7c62d7392035a334c4e61bdb368ee558 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span style=\"color: #000000;\">Over the past eight years, our team has worked hard to develop the most understandable, affordable, and comprehensive vulnerability management solution currently available. As a result, we can thoroughly scan your entire infrastructure for more than 150,000 vulnerabilities in a very short time. And if you prefer to do this in a structured way yourself, you can do so with <a href=\"https:\/\/cyberant.com\/en\/vulnerability-management-netcaptain\/\">NetCaptain<\/a>.<\/span><\/p>\n<\/div><\/section><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ivx1zs-004f8b2fc35a89a47750c9c16d53326d\">\n.avia-section.av-ivx1zs-004f8b2fc35a89a47750c9c16d53326d{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/03\/bg-expertise-cyberant-2.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-ivx1zs-004f8b2fc35a89a47750c9c16d53326d main_color avia-section-default avia-no-border-styling  avia-builder-el-20  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll container_wrap sidebar_right'  data-section-bg-repeat='stretch'><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47604'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-9hkmmg-76e3d96f52972eb57cbe62fc8c9c936d av_one_half  avia-builder-el-21  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><\/div><div  class='flex_column av-62m6rs-e7525bd417b182d7a8f7af3d55f594f6 av_one_half  avia-builder-el-22  el_after_av_one_half  avia-builder-el-last  flex_column_div  '     ><section  class='av_textblock_section av-4tm15k-28cc751baec07fc81166a6e35035020b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Vulnerability management or a pentest<\/h2>\n<p>So isn&#8217;t it at all useful to have a <a href=\"https:\/\/cyberant.com\/pentest\/\">pentest<\/a> performed on a regular basis? It certainly is: it is precisely the human factor of a penetration test that is so important in exposing the risks of certain vulnerabilities. After all, a human being is creative and understands the context of your organization. It even happens that our hackers develop a tool during a test that can exploit a vulnerability so specific that no tool exists that can do it.<\/p>\n<p>When you have a pentest performed by CyberAnt, an ethical hacker is manually trying to penetrate as a hacker with malicious intent would. In doing so, he or she purposefully looks for security risks and then exploits them. Actually attacking these vulnerabilities is a crucial part of pentesting, as their danger is often difficult to assess. It is precisely by exploiting them that we discover whether seemingly innocuous vulnerabilities can&#8217;t cause nasty consequences after all.<\/p>\n<p>Therefore, a pentest is another solution to a different question. Do you want a broad and continuous solution? Then choose <a href=\"https:\/\/cyberant.com\/vulnerability-management\/netcaptain\/\">NetCaptain<\/a>. Want a deep dive on a specific application? Then it&#8217;s best to go for a pentest. Want to know more about the differences between a pentest and vulnerability management? In our <a href=\"https:\/\/cyberant.com\/kennisbank\/pentest-vs-vm\/\">knowledge base article<\/a>, we explore the differences between these two research methods.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lezpdad6-9044abdb8a9f3d3faced26295dcc2073-wrap avia-button-left  avia-builder-el-24  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lezpdad6-9044abdb8a9f3d3faced26295dcc2073\">\n#top #wrap_all .avia-button.av-lezpdad6-9044abdb8a9f3d3faced26295dcc2073{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\nborder-style:none;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 20px 0;\n}\n#top #wrap_all .avia-button.av-lezpdad6-9044abdb8a9f3d3faced26295dcc2073:hover{\nbackground-color:#222222;\ncolor:white;\nopacity:1;\ntransition:all 0.4s ease-in-out;\n}\n<\/style>\n<a href='https:\/\/cyberant.com\/en\/pen_test\/'  class='avia-button av-lezpdad6-9044abdb8a9f3d3faced26295dcc2073 av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'   aria-label=\"Learn more about the pen test\"><span class='avia_iconbox_title' >Learn more about the pen test<\/span><span class='avia_button_icon avia_button_icon_right' aria-hidden='true' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello'><\/span><\/a><\/div><\/p><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lezr1t7v-5de7419757c50e425d252ad82ee6ef21\">\n.avia-section.av-lezr1t7v-5de7419757c50e425d252ad82ee6ef21{\nbackground-color:#ffffff;\nbackground:linear-gradient( to bottom, #ffffff, #ededed );\nmargin-top:20px;\nmargin-bottom:0px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-lezr1t7v-5de7419757c50e425d252ad82ee6ef21 main_color avia-section-large avia-no-border-styling  avia-builder-el-25  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47604'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-48oisxf-8a0720280749bc3015bc162f357c8ca7 av_one_full  avia-builder-el-26  el_before_av_one_fourth  avia-builder-el-first  first flex_column_div  '     ><section  class='av_textblock_section av-3rr1cyb-d89657aa3f45998b4518e4a08ea5ffb3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 style=\"text-align: center;\">Cybersecurity solutions from CyberAnt<\/h2>\n<p style=\"text-align: center;\">CyberAnt offers various cybersecurity solutions to efficiently identify vulnerabilities in any network or system. This allows you to make targeted improvements to optimally secure your online infrastructure and effectively keep hackers out.<\/p>\n<\/div><\/section><\/div><div  class='flex_column av-18g3ger-afb5616a1a9a7eec29de42d3cf20fa9f av_one_fourth  avia-builder-el-28  el_after_av_one_full  el_before_av_one_fourth  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-22g6r7-28e2e59ef2732f94551a702dac637a30\">\n.av_font_icon.av-22g6r7-28e2e59ef2732f94551a702dac637a30{\ncolor:#55bfa8;\nborder-color:#55bfa8;\n}\n.av_font_icon.av-22g6r7-28e2e59ef2732f94551a702dac637a30 .av-icon-char{\nfont-size:40px;\nline-height:40px;\n}\n<\/style>\n<span  class='av_font_icon av-22g6r7-28e2e59ef2732f94551a702dac637a30 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-icon-animate'><span class='av-icon-char' aria-hidden='true' data-av_icon='\ue812' data-av_iconfont='entypo-fontello' ><\/span><\/span><br \/>\n<section  class='av_textblock_section av-lezr1lkg-25ebf5dcec12826ead44d56df0867513 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Tackle it thoroughly by having a complete <a href=\"https:\/\/cyberant.com\/pentest\/\">pentest<\/a>, where our ethical hackers simulate a real attack within an agreed upon scope and context.<\/p>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-3do4wib-8e1470a427a563a4c68008993c6abec8 av_one_fourth  avia-builder-el-31  el_after_av_one_fourth  el_before_av_one_fourth  flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lezr0jdo-46e3de13f9a87641c0e8f6620b07a52e\">\n.av_font_icon.av-lezr0jdo-46e3de13f9a87641c0e8f6620b07a52e{\ncolor:#55bfa8;\nborder-color:#55bfa8;\n}\n.av_font_icon.av-lezr0jdo-46e3de13f9a87641c0e8f6620b07a52e .av-icon-char{\nfont-size:40px;\nline-height:40px;\n}\n<\/style>\n<span  class='av_font_icon av-lezr0jdo-46e3de13f9a87641c0e8f6620b07a52e avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-icon-animate'><span class='av-icon-char' aria-hidden='true' data-av_icon='\ue812' data-av_iconfont='entypo-fontello' ><\/span><\/span><br \/>\n<section  class='av_textblock_section av-lezr08rz-4046f41dbb5e5bb69ff03f48e0f9e33f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Choose <a href=\"https:\/\/cyberant.com\/vulnerability-management\/netcaptain\/\">NetCaptain<\/a>, CyberAnt&#8217;s vulnerability management solution, if you want to be continuously aware of network vulnerabilities.<\/p>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-b4aq4z-16ed2cfe9517607a4fde76df3a45b4ee av_one_fourth  avia-builder-el-34  el_after_av_one_fourth  el_before_av_one_fourth  flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2qtqulv-ca6dfed31689be7bf20c775bc8231733\">\n.av_font_icon.av-2qtqulv-ca6dfed31689be7bf20c775bc8231733{\ncolor:#55bfa8;\nborder-color:#55bfa8;\n}\n.av_font_icon.av-2qtqulv-ca6dfed31689be7bf20c775bc8231733 .av-icon-char{\nfont-size:40px;\nline-height:40px;\n}\n<\/style>\n<span  class='av_font_icon av-2qtqulv-ca6dfed31689be7bf20c775bc8231733 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-icon-animate'><span class='av-icon-char' aria-hidden='true' data-av_icon='\ue812' data-av_iconfont='entypo-fontello' ><\/span><\/span><br \/>\n<section  class='av_textblock_section av-lezr14ep-a45e19c9deb84f951e4125dac04a4b41 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The CyberAnt <a href=\"https:\/\/cyberant.com\/quickscan\/\">Quickscan<\/a> scans your website <strong>for<\/strong> 20 common vulnerabilities <strong>for free<\/strong>. You will immediately receive an indication of the security status of your website.<\/p>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-285zgr7-02ba61207be2019e13bf2b1a1425db92 av_one_fourth  avia-builder-el-37  el_after_av_one_fourth  avia-builder-el-last  flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1t0memr-2a0dfd6870bf40b9ca9ee65c4ae723d8\">\n.av_font_icon.av-1t0memr-2a0dfd6870bf40b9ca9ee65c4ae723d8{\ncolor:#55bfa8;\nborder-color:#55bfa8;\n}\n.av_font_icon.av-1t0memr-2a0dfd6870bf40b9ca9ee65c4ae723d8 .av-icon-char{\nfont-size:40px;\nline-height:40px;\n}\n<\/style>\n<span  class='av_font_icon av-1t0memr-2a0dfd6870bf40b9ca9ee65c4ae723d8 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-icon-animate'><span class='av-icon-char' aria-hidden='true' data-av_icon='\ue812' data-av_iconfont='entypo-fontello' ><\/span><\/span><br \/>\n<section  class='av_textblock_section av-lezr1bwo-c232b03df079e197891e4b29311e438f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Laat een\u00a0<a href=\"https:\/\/cyberant.com\/website-security-check\/\">Website Security Check<\/a> uitvoeren om de volledige veiligheid van je website te testen. Met deze \u2018mini-pentest\u2019 brengen we kwetsbaarheden van jouw website in kaart.<\/p>\n<\/div><\/section><\/p><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_4'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47604'><div class='entry-content-wrapper clearfix'><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-47604","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=47604"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47604\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=47604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}