Cybercentry
  • Welcome
  • Genesis Launch
    • Cybercentry Trade-in Programme
      • Terms and Conditions
  • Whitepaper
    • Abstract
    • Introduction
    • Market Opportunity
    • Tokenomics Plan
    • The Team
    • Partnerships
    • Leveraging External Support
    • Smart Contract Security
    • Roadmap (2025–2029)
    • Technology Architecture
    • User Adoption Strategies
    • Regulatory Compliance and Ethics
    • Conclusion
    • References
  • Documents
    • @centry_agent
    • Cybercentry Marketplace
    • End of Life Scanning
    • Penetration Testing
    • Smart Contract Scanning
    • Vulnerability Scanning
  • Partners
    • Bulletproof
    • CompTIA
    • CoreView
    • Cyberbit
    • Greenbone
    • ISC2
    • Kite
    • MAD20
    • Otorio
    • Pervade Software
    • Proton
    • Solidity Scan
    • Sonar
    • Vanta
  • Getting Started
    • Quickstart
    • Publish your docs
  • Basics
    • Editor
    • Markdown
    • Images & media
    • Interactive blocks
    • OpenAPI
    • Integrations
Powered by GitBook
On this page
  1. Documents

Vulnerability Scanning

Cybercentry provides a user-friendly, high-quality vulnerability scanning service. It checks the IT infrastructure for security gaps and delivers a report containing all found vulnerabilities, sorted by severity.

For this purpose, Cybercentry offers the possibility to define the number of IP addresses to be scanned individually. Commercial and public entities of any size can utilise the service in a self-service manner to address their specific security needs.

Users log in using their access data and are able to work with the service independent of their location. While doing so, both public IP services (such as the WWW server and e-mail server) and internal networks can be scanned. The packages are structured as subscriptions and can be terminated or edited on a monthly basis.

PreviousSmart Contract ScanningNextPartners

Last updated 6 days ago