{"id":121629,"date":"2023-03-09T10:00:00","date_gmt":"2023-03-09T09:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=121629"},"modified":"2023-02-09T09:15:24","modified_gmt":"2023-02-09T08:15:24","slug":"digitalization-of-processes","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/digitalization-of-processes\/","title":{"rendered":"Digitization of processes"},"content":{"rendered":"<h2 class=\"wp-block-heading\">81 percent of large German companies have deficits in dealing with vulnerabilities<\/h2>\n\n\n\n<p>In particular, the regularity and depth of vulnerability scans are of crucial importance here. But it is precisely here that German companies show fundamental deficiencies that can lead to serious consequences. Regularly examining one's own IT infrastructure for vulnerabilities is one of the core aspects of minimizing security risks through a forward-looking strategy. In 45 percent of the companies surveyed, for example, the IT infrastructure is scanned for security gaps using a software solution on a daily basis, and in more than one in three on a weekly basis. By contrast, one in five German companies carries out such a scan only once a month (10 percent) or irregularly (11 percent) without a routine.\u00a0<\/p>\n\n\n\n<p>This shows that the regularity of a security scan varies greatly depending on the size of the company; the larger the company, the more frequently scans are performed. Especially in grown and complex IT infrastructures, routine and continuous vulnerability scans must complement the IT security concept, otherwise companies run the risk of falling victim to cybercriminals. In cooperation with ManageEngine, the research and analyst firm Techconsult investigated the question of how vulnerability management is structured in German companies and what role software solutions play in this context. For this purpose, 150 IT managers from companies with at least 2000 employees were surveyed in the now published study \"Efficient vulnerability management in dynamic IT infrastructures: How German companies deal with IT security risks\".<\/p><div id=\"great-1196638741\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>Optimized closure of critical gaps can be achieved not least with the help of a holistic software solution. However, only one in three companies surveyed (33 percent) uses a holistic solution for scanning, assessing and remediating vulnerabilities.<\/p>\n\n\n\n<p>In contrast, 38 percent of organizations use two separate applications for assessment and remediation, which can lead to a more cumbersome and longer remediation process. The longer a vulnerability remains open, the greater the risk of attack, because cybercriminals seek out precisely these \"open gates.\" One in ten companies (11 percent), meanwhile, appears to be at a permanently high risk. In these companies, the complete abandonment of supporting software solutions, using only manual vulnerability assessment and remediation, leads not only to a disproportionately high burden on IT security managers, but also to more security breaches. The extent to which these two factors play out is directly dependent on the complexity of the IT infrastructure in question.<\/p>\n\n\n\n<p>To reduce the extent of potential damage, the companies surveyed prioritize identified vulnerabilities in particular according to damage potential (54 percent) and exploitability (47 percent). This is because highly critical vulnerabilities that can be easily exploited and cause major damage should be closed immediately and with the highest priority. Along with this, severity and vulnerability (45 percent) and the number of affected systems (43 percent) are often used for prioritization. As part of a forward-looking security strategy, vulnerabilities should be assessed using software in order to reliably prioritize and thereby minimize risks.<\/p>","protected":false},"excerpt":{"rendered":"<p>Increasing digitization of processes is inevitable for German companies. In this context, vulnerability management is becoming increasingly complex and, not least, more confusing due to shadow IT.<\/p>","protected":false},"author":38,"featured_media":121633,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,42102],"tags":[31057,601,42103,7649],"coauthors":[19920],"class_list":["post-121629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-23-02","tag-cybercrime","tag-digitalisierung","tag-mag-23-02","tag-techconsult","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",1200,540,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",1200,540,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-1168x526.jpg",1168,526,true],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",1200,540,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",1200,540,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",1200,540,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",1200,540,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",1200,540,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",1200,540,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",1200,540,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/03\/shutterstock_1946072971_GoldenDayz-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Eine zunehmende Digitalisierung von Prozessen ist f\u00fcr deutsche Unternehmen unausweichlich. In diesem Zusammenhang wird das Management von Schwachstellen immer komplexer und nicht zuletzt durch Schatten-IT un\u00fcbersichtlicher.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/sap-news\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-23-02\/\" rel=\"category tag\">Mag 23-02<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/121629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=121629"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/121629\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/121633"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=121629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=121629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=121629"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=121629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}