Category Topics

Vulnerability Tests

Vulnerability tests (VTs) are executed by a scanner and detect vulnerabilities of various kind.
VTs also detect services, products etc. and gather policy compliance information.

Greenbone Source Edition (GSE)

The Greenbone Source Edition (GSE) covers the actual source codes of the Greenbone application stack for vulnerability scanning and vulnerability management (GVM).

Feed Services (GCF & GSF)

The daily updated feed services cover latest vulnerability tests, security information and related data.

Greenbone Professional Edition

The Greenbone Professional Edition (GPE) is our product line for on-premises solutions.


This is a read-only category for news to customers and community about our commercial and community
products as well as related topics in security incidents, cyber resilience insights and company news.

Greenbone Managed Service Platform (GMSP)

Greenbone Managed Service Platforms are operated by Greenbone Partners acting as Managed Service Provider (MSP) where virtual MSPs can configure their style and offerings for vulnerability scanning/management and beyond to customers.

Greenbone Management Protocol (GMP)

The Greenbone Management Protocol is the central API allowing to control all functionalities of the Greenbone Vulnerability Manager and thus of the Greenbone Security Manager appliances as well. Even the web-client GSA exclusively uses GMP to communicate with the back-end.
Technically speaking, GMP is a XML-based human-readable, stateless request-response protocol.

Open Scanner Protocol (OSP)

The Open Scanner Protocol is designed to allow controlling various vulnerability scanners. These scanners must either offer the protocol OSP on their own or be connected via an adapter (“OSP wrapper”).


This is a read-only category about the company Greenbone. It is about human matters like job offers and it is about technical matters like how we protect our communication.

Security Processes

A security process is what goes beyond just applying a single security product or a single security guideline. Combining technical and organizational elements and making it a routine is what forms a security process.

Security Transparent

Security Transparent is name and credo for our annual user conferences. Every year in May (since 2015) we organize this conference for our customers to share experience, to network, and - for us - to update about what’s in our minds and on our roadmap.
Within this category you’ll find presentations, talks, and other documentation about past events. Also we will post information about the plans for the next one.