{"id":74401,"date":"2025-10-25T21:43:11","date_gmt":"2025-10-25T21:43:11","guid":{"rendered":"https:\/\/complior.se\/?page_id=74401"},"modified":"2026-01-20T04:47:02","modified_gmt":"2026-01-20T03:47:02","slug":"vulnerability-scan","status":"publish","type":"page","link":"https:\/\/complior.se\/en\/vulnerability-scan\/","title":{"rendered":"Vulnerability Assessment"},"content":{"rendered":"<div class=\"wp-block-cover is-light blockera-block blockera-block--472ip2\" style=\"margin-top:0px;margin-bottom:0px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#f9f9f9\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-06b2d336 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center blockera-block blockera-block-hbxtmc is-layout-flex wp-container-core-columns-is-layout-bbbd7ad0 wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--superbspacing-xsmall);padding-bottom:var(--wp--preset--spacing--superbspacing-xsmall)\">\n<div class=\"wp-block-column is-vertically-aligned-center blockera-block blockera-block-z3pcky is-layout-flow wp-container-core-column-is-layout-344ebfd7 wp-block-column-is-layout-flow\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;flex-basis:50%\">\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-3540e7cd wp-block-group-is-layout-constrained\">\n<h1 class=\"kt-adv-heading74401_e5d6fd-ca wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_e5d6fd-ca\">S\u00e5rbarhetsanalys som tj\u00e4nst<\/h1>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-d73614d0 wp-block-group-is-layout-constrained\" style=\"border-left-color:#0d875c;border-left-width:6px;margin-top:var(--wp--preset--spacing--superbspacing-xsmall);margin-bottom:var(--wp--preset--spacing--superbspacing-xsmall);padding-top:1px;padding-right:var(--wp--preset--spacing--superbspacing-xsmall);padding-left:var(--wp--preset--spacing--superbspacing-xsmall)\">\n<p class=\"kt-adv-heading74401_ecb0cc-e4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_ecb0cc-e4\"><strong><strong>Uppt\u00e4ck s\u00e4kerhetsluckorna innan de utnyttjas. Vi erbjuder kontinuerlig \u00f6vervakning av er IT-milj\u00f6 f\u00f6r att identifiera, prioritera och \u00e5tg\u00e4rda svagheter \u2013 en f\u00f6ruts\u00e4ttning f\u00f6r att m\u00f6ta kraven i PCI DSS och ISO 27001.<\/strong><\/strong><\/p>\n<\/div>\n\n\n\n<p class=\"kt-adv-heading74401_c5fe4e-44 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_c5fe4e-44\">Nya s\u00e5rbarheter i programvara och system uppt\u00e4cks dagligen, vilket g\u00f6r att traditionella, \u00e5rliga s\u00e4kerhetskontroller inte l\u00e4ngre r\u00e4cker till.<br>Compliors s\u00e5rbarhetsanalys ger er en automatiserad och regelbunden granskning av b\u00e5de er externa exponering mot internet och er interna infrastruktur. Vi hj\u00e4lper er att g\u00e5 fr\u00e5n reaktiv brandsl\u00e4ckning till proaktiv riskhantering genom att uppt\u00e4cka allt fr\u00e5n ouppdaterad mjukvara till farliga felkonfigureringar.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-b10e4784\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-e51d2f16 wp-block-button scale-hover\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/complior.se\/en\/contact\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Contact us<\/div><span class=\"uagb-button__icon uagb-button__icon-position-after\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\" aria-hidden=\"true\" focussable=\"false\"><path d=\"M438.6 278.6l-160 160C272.4 444.9 264.2 448 256 448s-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L338.8 288H32C14.33 288 .0016 273.7 .0016 256S14.33 224 32 224h306.8l-105.4-105.4c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160C451.1 245.9 451.1 266.1 438.6 278.6z\"><\/path><\/svg><\/span><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center blockera-block blockera-block-to73p7 is-horizontal is-content-justification-right is-layout-flow wp-container-core-column-is-layout-3ad7135e wp-block-column-is-layout-flow\" style=\"padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-kadence-image kb-image74401_5b9fa6-23 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"701\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-1024x701.png\" alt=\"Ett kassask\u00e5p med en symbol som en s\u00f6ld som symboliserar s\u00e4ker data.\" class=\"kb-img wp-image-77241\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-1024x701.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-300x205.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-768x525.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-18x12.png 18w, https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089.png 1216w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-b13ovl has-global-padding is-layout-constrained wp-container-core-group-is-layout-e555385e wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-uagb-container uagb-block-7ffa5b03 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-w2c18x is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-08b5c971 wp-block-group-is-layout-flex\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-uagb-container uagb-block-0211ae7b\">\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-b1ab7395 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-bottom:0\">\n<h2 class=\"kt-adv-heading74401_d153b3-f2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_d153b3-f2\">G\u00e5 fr\u00e5n reaktiv till proaktiv IT-s\u00e4kerhet<\/h2>\n\n\n\n<p class=\"kt-adv-heading74401_8cc301-d6 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_8cc301-d6\">Att bara reagera p\u00e5 incidenter \u00e4r ofta f\u00f6r sent och kostsamt. F\u00f6r f\u00f6retag som vill s\u00e4kra sin aff\u00e4rskritiska data och undvika driftstopp erbjuder vi skr\u00e4ddarsydda l\u00f6sningar f\u00f6r kontinuerlig s\u00e5rbarhetsanalys. Vi hj\u00e4lper er att identifiera riskerna innan de blir problem \u2013 s\u00e5 att ni kan fokusera p\u00e5 er k\u00e4rnverksamhet.<\/p>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-2ab15fae\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-d12e540a wp-block-button scale-hover\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/complior.se\/en\/contact\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Get started<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-99b3c5e8\">\n<div class=\"wp-block-group blockera-block blockera-block-7ehmp2 is-vertical is-layout-flex wp-container-core-group-is-layout-13e57698 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-bottom:0\">\n<h2 class=\"kt-adv-heading74401_367e66-07 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_367e66-07\">Our service assists in:<\/h2>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-a4818bd4 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0\"><p class=\"kt-adv-heading74401_066466-2b wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading74401_066466-2b\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_checkCircle kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\"><strong>Automatisk detektion<\/strong> Identifiera och klassificera s\u00e5rbarheter i era system, molntj\u00e4nster och applikationer.<\/span><\/p>\n\n<p class=\"kt-adv-heading74401_4585b6-16 wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading74401_4585b6-16\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_checkCircle kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\"><strong>Riskbaserad prioritering<\/strong> Slipp drunkna i larm. Vi hj\u00e4lper er att prioritera \u00e5tg\u00e4rder baserat p\u00e5 faktisk riskniv\u00e5 och kritikalitet f\u00f6r verksamheten.<\/span><\/p>\n\n<p class=\"kt-adv-heading74401_a6cdd4-04 wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading74401_a6cdd4-04\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_checkCircle kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\"><strong>Konkreta \u00e5tg\u00e4rdsplaner<\/strong> F\u00e5 tydliga rekommendationer och instruktioner f\u00f6r hur ni snabbast t\u00e4pper till s\u00e4kerhetsluckorna.<\/span><\/p>\n\n<p class=\"kt-adv-heading74401_8de475-66 wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading74401_8de475-66\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_checkCircle kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\"><strong>F\u00f6rebygg intr\u00e5ng &amp; m\u00f6t lagkrav<\/strong> St\u00e4rk f\u00f6retagets motst\u00e5ndskraft mot ransomware och dataintr\u00e5ng samtidigt som ni uppfyller kraven p\u00e5 s\u00e4kerhetstester i NIS2.<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d17992f4 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-columns blockera-block blockera-block-u2y5le is-layout-flex wp-container-core-columns-is-layout-1b896e15 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column blockera-block blockera-block-w9abmf is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group blockera-block blockera-block-1fn15f8 has-global-padding is-layout-constrained wp-container-core-group-is-layout-c4530e5b wp-block-group-is-layout-constrained\" style=\"margin-bottom:32px\">\n<h2 class=\"kt-adv-heading74401_369ebe-8d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_369ebe-8d\">PCI DSS and ASV: Compliance and certification<\/h2>\n\n\n\n<p class=\"kt-adv-heading74401_9973d3-47 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_9973d3-47\">Within the framework of the Payment Card Industry Data Security Standard (PCI DSS), vulnerability scanning is a necessary component to achieve and maintain compliance.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1bdc4ji has-global-padding is-layout-constrained wp-container-core-group-is-layout-bdcbbb17 wp-block-group-is-layout-constrained\">\n<p class=\"kt-adv-heading74401_7dd1b0-fe wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_7dd1b0-fe\"><strong>We offer:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-a4818bd4 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0\"><p class=\"kt-adv-heading74401_66b426-7b wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading74401_66b426-7b\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_arrowRight kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">Vulnerability scanning that meets PCI DSS requirements for periodic scanning.<\/span><\/p>\n\n<p class=\"kt-adv-heading74401_cc53b3-66 wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading74401_cc53b3-66\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_arrowRight kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">Prioritizing actions based on the level of risk.<\/span><\/p>\n\n<p class=\"kt-adv-heading74401_ece8c0-af wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading74401_ece8c0-af\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_arrowRight kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">Providing recommendations to address identified vulnerabilities.<\/span><\/p>\n\n<p class=\"kt-adv-heading74401_5d55fe-24 wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading74401_5d55fe-24\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_arrowRight kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">Enhancing the company's security and preventing data breaches.<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7f8c455e alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-columns blockera-block blockera-block-u2y5le is-layout-flex wp-container-core-columns-is-layout-1b896e15 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column blockera-block blockera-block-w9abmf is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group blockera-block blockera-block-ahoplx has-global-padding is-layout-constrained wp-container-core-group-is-layout-c4530e5b wp-block-group-is-layout-constrained\" style=\"margin-bottom:32px\">\n<h2 class=\"kt-adv-heading74401_3577b2-6f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_3577b2-6f\">Basic steps in a vulnerability scan<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1grgnfs has-global-padding is-layout-constrained wp-container-core-group-is-layout-334a2726 wp-block-group-is-layout-constrained\">\n<h2 class=\"kt-adv-heading74401_8991ce-a3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_8991ce-a3\">Vulnerability Assessment<\/h2>\n\n\n\n<p class=\"kt-adv-heading74401_2ac04c-a6 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_2ac04c-a6\">Complior utf\u00f6r s\u00e5rbarhetsanalys mot organisationens ut\u00e5triktade tj\u00e4nst. Dessa skanningar letar efter potentiella s\u00e5rbarheter och s\u00e4kerhetsproblem som kan utnyttjas av angripare.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1a46aut has-global-padding is-layout-constrained wp-container-core-group-is-layout-334a2726 wp-block-group-is-layout-constrained\">\n<h2 class=\"kt-adv-heading74401_696281-0d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_696281-0d\">Rapportering<\/h2>\n\n\n\n<p class=\"kt-adv-heading74401_6df75d-dc wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_6df75d-dc\">After the scan is completed, a report is generated showing the discovered vulnerabilities and their severity. The organization must then address these vulnerabilities and remediate them.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1blo8d4 has-global-padding is-layout-constrained wp-container-core-group-is-layout-334a2726 wp-block-group-is-layout-constrained\">\n<h2 class=\"kt-adv-heading74401_c1ebde-40 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_c1ebde-40\">\u00c5terkontroll<\/h2>\n\n\n\n<p class=\"kt-adv-heading74401_635fcd-5b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_635fcd-5b\">After the vulnerabilities have been addressed, the organization must undergo an additional scan to ensure that the issues have been properly remediated.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1nd6o17 has-global-padding is-layout-constrained wp-container-core-group-is-layout-334a2726 wp-block-group-is-layout-constrained\">\n<h2 class=\"kt-adv-heading74401_cf39db-ad wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_cf39db-ad\">Attestering<\/h2>\n\n\n\n<p class=\"kt-adv-heading74401_b04226-ab wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading74401_b04226-ab\">In PCI DSS compliance, if the scan no longer finds any significant vulnerabilities, a vulnerability attestation is issued. This attestation is required as part of PCI DSS certification and must be provided to the organization's bank and credit card processors.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>G\u00e5 fr\u00e5n reaktiv till proaktiv IT-s\u00e4kerhet Att bara reagera p\u00e5 incidenter \u00e4r ofta f\u00f6r sent och kostsamt. F\u00f6r f\u00f6retag som vill s\u00e4kra sin aff\u00e4rskritiska data och undvika driftstopp erbjuder vi skr\u00e4ddarsydda l\u00f6sningar f\u00f6r kontinuerlig s\u00e5rbarhetsanalys. Vi hj\u00e4lper er att identifiera riskerna innan de blir problem \u2013 s\u00e5 att ni kan fokusera p\u00e5 er k\u00e4rnverksamhet. V\u00e5r [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"blank","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"class_list":["post-74401","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e5rbarhetsanalys - Complior<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/vulnerability-scan\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e5rbarhetsanalys - Complior\" \/>\n<meta property=\"og:description\" content=\"G\u00e5 fr\u00e5n reaktiv till proaktiv IT-s\u00e4kerhet Att bara reagera p\u00e5 incidenter \u00e4r ofta f\u00f6r sent och kostsamt. F\u00f6r f\u00f6retag som vill s\u00e4kra sin aff\u00e4rskritiska data och undvika driftstopp erbjuder vi skr\u00e4ddarsydda l\u00f6sningar f\u00f6r kontinuerlig s\u00e5rbarhetsanalys. Vi hj\u00e4lper er att identifiera riskerna innan de blir problem \u2013 s\u00e5 att ni kan fokusera p\u00e5 er k\u00e4rnverksamhet. V\u00e5r [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/vulnerability-scan\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T03:47:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1216\" \/>\n\t<meta property=\"og:image:height\" content=\"832\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/vulnerability-scan\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/vulnerability-scan\\\/\",\"name\":\"S\u00e5rbarhetsanalys - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/vulnerability-scan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/vulnerability-scan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-1024x701.png\",\"datePublished\":\"2025-10-25T21:43:11+00:00\",\"dateModified\":\"2026-01-20T03:47:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/vulnerability-scan\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/vulnerability-scan\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/vulnerability-scan\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-1024x701.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-1024x701.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/vulnerability-scan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e5rbarhetsanalys\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e5rbarhetsanalys - Complior","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/vulnerability-scan\/","og_locale":"en_GB","og_type":"article","og_title":"S\u00e5rbarhetsanalys - Complior","og_description":"G\u00e5 fr\u00e5n reaktiv till proaktiv IT-s\u00e4kerhet Att bara reagera p\u00e5 incidenter \u00e4r ofta f\u00f6r sent och kostsamt. F\u00f6r f\u00f6retag som vill s\u00e4kra sin aff\u00e4rskritiska data och undvika driftstopp erbjuder vi skr\u00e4ddarsydda l\u00f6sningar f\u00f6r kontinuerlig s\u00e5rbarhetsanalys. Vi hj\u00e4lper er att identifiera riskerna innan de blir problem \u2013 s\u00e5 att ni kan fokusera p\u00e5 er k\u00e4rnverksamhet. V\u00e5r [&hellip;]","og_url":"https:\/\/complior.se\/en\/vulnerability-scan\/","og_site_name":"Complior","article_modified_time":"2026-01-20T03:47:02+00:00","og_image":[{"width":1216,"height":832,"url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/complior.se\/vulnerability-scan\/","url":"https:\/\/complior.se\/vulnerability-scan\/","name":"S\u00e5rbarhetsanalys - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/vulnerability-scan\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/vulnerability-scan\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-1024x701.png","datePublished":"2025-10-25T21:43:11+00:00","dateModified":"2026-01-20T03:47:02+00:00","breadcrumb":{"@id":"https:\/\/complior.se\/vulnerability-scan\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/vulnerability-scan\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/vulnerability-scan\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-1024x701.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/11\/freepik__data-vault-next-to-a-glossy-shield-layered-locks-a__80089-1024x701.png"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/vulnerability-scan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"S\u00e5rbarhetsanalys"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"Johan Challita","author_link":"https:\/\/complior.se\/en\/author\/johan-challita\/"},"uagb_comment_info":0,"uagb_excerpt":"G\u00e5 fr\u00e5n reaktiv till proaktiv IT-s\u00e4kerhet Att bara reagera p\u00e5 incidenter \u00e4r ofta f\u00f6r sent och kostsamt. F\u00f6r f\u00f6retag som vill s\u00e4kra sin aff\u00e4rskritiska data och undvika driftstopp erbjuder vi skr\u00e4ddarsydda l\u00f6sningar f\u00f6r kontinuerlig s\u00e5rbarhetsanalys. Vi hj\u00e4lper er att identifiera riskerna innan de blir problem \u2013 s\u00e5 att ni kan fokusera p\u00e5 er k\u00e4rnverksamhet. V\u00e5r&hellip;","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/pages\/74401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=74401"}],"version-history":[{"count":30,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/pages\/74401\/revisions"}],"predecessor-version":[{"id":79317,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/pages\/74401\/revisions\/79317"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=74401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}