Skip to content

From Outside-In to Inside-Out

You already know what attackers see from the outside. Now find out what they can reach from the inside. Our vulnerability assessment bridges the gap between threat intelligence and real internal exposure.

Threat Intelligence Is Only Half the Picture

External scans reveal what is exposed — but not what is vulnerable behind the firewall. Breached credentials and open ports are symptoms, not the full diagnosis.

Over 200 new CVEs are published every week. Without internal scanning, you cannot know which ones actually affect your systems.

Compliance frameworks like NIS2 and ISO 27001 require both external and internal vulnerability management — external-only leaves audit gaps.

Without connecting outside-in intelligence to inside-out assessment, security teams operate with blind spots that attackers exploit.

Outside-In Meets Inside-Out

External Attack Surface (Outside-In)

We start where our Threat Intelligence platform leaves off: domain reconnaissance, exposed services, leaked credentials, email security gaps. This is your attacker's view — the starting point of every assessment.

Internal Vulnerability Scanning (Inside-Out)

Authenticated scans of your internal infrastructure: servers, workstations, network devices, cloud environments. We find what is invisible from the outside — misconfigurations, unpatched systems, privilege escalation paths.

Intelligence-Driven Prioritization

We correlate external threat data with internal findings. A vulnerability that is both externally reachable and internally exploitable gets top priority — not just a high CVSS score.

Actionable Remediation Roadmap

Prioritized fix list with business context. Executive summary for leadership, technical detail for operations. Every finding comes with a clear remediation path and verification plan.

Choose Your Assessment Depth

Start from the outside, go as deep as you need. Every tier includes a free 30-minute consultation to scope your environment.

External Assessment

from €2,500one-time

Outside-In — see what attackers see

  • Domain-based attack surface discovery
  • External vulnerability scanning
  • Credential breach check
  • Email security analysis (SPF/DKIM/DMARC)
  • Threat intelligence enrichment
  • Management summary report
  • Free 30-min scoping call
Book a Free Consultation
Recommended

Full Assessment

from €5,000one-time

Outside-In + Inside-Out — the complete picture

  • Everything in External Assessment
  • Authenticated internal network scanning
  • Server & workstation vulnerability analysis
  • Cloud environment assessment
  • Intelligence-driven risk prioritization
  • Detailed remediation roadmap
  • Executive report + technical appendix
  • One follow-up re-scan included
  • Free 30-min scoping call
Book a Free Consultation

Continuous Security

from €2,500/month

Always-on monitoring — outside and inside

  • Everything in Full Assessment
  • Monthly external + internal re-scans
  • Continuous attack surface monitoring
  • New CVE impact alerts for your stack
  • Quarterly trend & progress reports
  • Remediation verification after each cycle
  • Dedicated security advisor
  • Compliance-ready documentation (NIS2 / ISO 27001)
  • Priority support & escalation
Book a Free Consultation

All prices excl. VAT. Final quote after a free scoping consultation tailored to your infrastructure size and complexity.

From Reconnaissance to Remediation

01

1. Scoping Consultation

Free 30-minute call to understand your environment, define scope, and select the right assessment depth. No commitment required.

02

2. Outside-In Reconnaissance

Attack surface discovery, external vulnerability scanning, and threat intelligence correlation. We map what is already visible to attackers.

03

3. Inside-Out Deep Scan

Authenticated internal scanning of networks, servers, endpoints, and cloud environments. We uncover what the outside view cannot reach.

04

4. Correlation & Prioritization

External findings meet internal reality. We merge both perspectives into a single risk picture — prioritized by real exploitability and business impact.

05

5. Reporting & Roadmap

Structured deliverable with executive summary and technical detail. Every finding has a severity rating, remediation recommendation, and verification criteria.

06

6. Follow-Up & Continuous Monitoring

Re-scan to verify fixes. For continuous clients: monthly cycles, trend tracking, and proactive alerts when new CVEs affect your stack.

Certifications & Qualifications

Our experts hold industry-recognized certifications.

OSCP
Offensive Security Certified Professional
PNPT
Practical Network Penetration Tester
PJPT
Practical Junior Penetration Tester
GOSI
GIAC Open Source Intelligence (SANS SEC497)

All services are delivered by Kaplan GmbH (Hamburg, Germany).

Frequently Asked Questions

The Tinte platform provides outside-in intelligence: attack surface visibility, breached credentials, email security, and industry threat data. The vulnerability assessment takes the next step — going inside your network with authenticated scans, correlating external intelligence with internal findings, and delivering a prioritized remediation roadmap. Think of it as: the platform shows what attackers see, the assessment shows what they can reach.
If you are already on the Tinte platform, you already have strong outside-in coverage. We recommend starting with the Full Assessment tier to add the inside-out perspective. During the scoping call, we will review your existing data and adjust the scope accordingly — you won't pay twice for what you already have.
A vulnerability assessment identifies and prioritizes weaknesses across a broad scope — systematically and efficiently. A penetration test goes deeper: vulnerabilities are actively exploited to prove real-world impact. The assessment gives you the map, the pentest proves what is reachable. We often recommend starting with an assessment and following up with targeted pentests on critical findings.
Yes. NIS2 requires demonstrable risk management including vulnerability identification and treatment. ISO 27001 mandates regular technical vulnerability reviews (A.12.6). Our reports are structured to satisfy both frameworks, and the Continuous Security tier provides the ongoing documentation auditors expect.
External Assessment: 3–5 business days. Full Assessment: 1–2 weeks depending on infrastructure size. Continuous Security: first full cycle in 2 weeks, then monthly. Timeline is confirmed during the scoping consultation.
Yes, completely free and no-obligation. 30 minutes to understand your environment, discuss your goals, and recommend the right tier. No sales pitch — just an honest assessment of what you need.

Ready to Go From Outside-In to Inside-Out?

Book a free 30-minute consultation. We will review your current security posture, recommend the right assessment depth, and scope a plan that fits your infrastructure.

Book a Free Consultation

No obligation · Response within 24 hours

We use cookies and similar technologies to analyze site usage and improve your experience. Privacy Policy