
Greenbone Security Manager - More GSM Appliances now available
Greenbone
In today's world, where even small businesses operate complex networks, it has become almost impossible to keep an overview. It is easy to lose track of computers, printers, voice over IP phones, servers, switches and so on.
Are all these devices up to date in terms of updates?
Are all these devices configured in such a way that no unwanted access from outside is possible?
Are you really sure about that?
If your answer is honest and "no", you have several options.
- Leave everything as it is. Not a good idea. A hack or infection by malware is only a matter of time.
- Assign a staff member the task of checking all devices. But what if the employee overlooks a device? Is the employee an expert on every IP-enabled device in your company and knows every little detail for the correct configuration?
- You hire an expert for a so-called penetration test, abbreviated to pentest. The advantage of this is that they are experts and can put your network through its paces. The disadvantage is that this is a snapshot and not a continuous check.
Especially in today's times, systems and networks are constantly developing and changing. What good is a snapshot if the situation looks completely different after the next Windows patch day? Pentesters are not cheap either. If you want to test your network continuously, you can invest your money better.
We offer a solution from Greenbone for this, the Greenbone Security Manager.
How exactly does the Greenbone GSM work?
The Greenbone Security Manager analyses your network and reports any problems found. You can simulate various scenarios here. For example, an external attack on web or email servers or even firewalls.
You can also go one step further and simulate an attack that has successfully penetrated the firewall, i.e. has gained access to the DMZ.
You can also simulate the behaviour of malware that has entered your network via an e-mail.
For this purpose, the Greenbone GSM uses a list of known vulnerabilities and examines the systems to see whether these vulnerabilities exist. The list contains over 60,000 entries. From standard passwords, to faulty configurations, to missing, or even faulty updates. Greenbone receives such information via Common Vulnerabilities and Exposures (CVE) or directly from the manufacturers.
After the analysis, you receive a prepared report and can view the problems found sorted by severity. Based on this report, you can then take appropriate measures. Be it with updates, improved configuration or stronger isolation and monitoring of the device in question.
Through the continuous review, you can also ensure that the measures taken are also effective. In addition, a continuous check can also quickly and reliably discover whether new vulnerabilities have occurred. This may be due to a new device in the company or an update that unfortunately has a security vulnerability.
By the way, you can also carry out an inventory with the continuous check. This inventory can also be carried out according to ISO27001 standards.
What sets Greenbone apart from other providers?
One of the biggest advantages is the independently auditable security. The technical procedures of the scan engine are open source and can be fully audited by customers or government testing and certification bodies.
What additionally distinguishes Greenbone from other companies. Here, licensing is based on the actual scanning performance of the appliance. While other companies license according to the number of IPs in the company, at Greenbone this is only done according to the actual performance of the appliance. This means, for example:
You have 2,000 IP capable devices in the company and you think that a daily scan is not necessary. You could, for example, use a GSM150. This can scan up to 500 IPs per day. This would enable you to scan every device every four days. This can save you a lot of money compared to other manufacturers.
The Greenbone GSM is available for a variety of business sizes. From the GSM Maven for small businesses to devices for corporations, which can scan up to 50,000 IPs.
A simple overview can be found in the following table:
Model name | Range of use | Scannable IPs per day* |
GSM Maven | Standalone | 300 |
GSM 25V | Scanner** | 300 |
GSM 35A | Scanner, standalone | 300 |
GSM 150A/150V | Scanner, standalone | 500 |
GSM 400 | Manager***, Scanner, Standalone | 2.000 |
GSM 600 | Manager, Scanner, Standalone | 6.000 |
GSM 650 | Manager, scanner, standalone | 10.000 |
GSM 5300 | Manager, Scanner, Standalone | 30.000 |
GSM 5400 | Manager, scanner, standalone | 40.000 |
GSM 6400 | Manager, Scanner, Standalone | 50.000 |
GSM 6500 | Manager, scanner, standalone | 80.000 |
*Depending on the selected scan patterns and target devices.
**Scanners send collected information to a manager.
***Can scan itself as well as receive information from a scanner.
Information is transmitted from scanners to the manager via encrypted connections. If no connection is possible or not allowed due to security regulations, the data can also be transferred to the manager via a USB stick. In this way, it is also possible to monitor devices behind an Airgap.

Marcel Zimmer is the Technical Managing Director of EnBITCon. During his time in the German Armed Forces, the trained IT developer was able to gain numerous project experiences. His interest in IT security was significantly awakened by his service in command support. Even after his service, he is an active reservist in the Bundeswehr.
His first firewall was a Sophos UTM 120, which he had to set up for a customer project. Since then, his interest in IT security has grown steadily. In the course of time, various security and infrastructure topics have come into his focus. His most interesting projects included, for example, WLAN coverage in an explosion-proof area, as well as a multi-site WLAN solution for a large