FAQ - Answers to Your Questions
Here you will find all the important questions and answers about IT risk analysis, security rating, monitoring, and data processing with LocateRisk—explained in a compact format.
Overview
Questions about LocateRisk
Questions about External Attack Surface Management (EASM)
Questions about SecurePlus
Questions about vendor risk management (VRM)
Questions about data protection & legal matters
Questions about LocateRisk
1) What is LocateRisk?
2) Who uses LocateRisk?
Typical user groups are:
• IT managers & CISOs
• Executive management & management
• Purchasing & Data Protection
• IT service providers, MSPs, and consulting firms
3) What are the main features offered by LocateRisk?
Continuous monitoring and assessment of your own externally visible IT infrastructure to identify undiscovered assets and vulnerabilities.
More information about External Attack Surface Management 2. Vendor Risk Management (VRM):
Automated security assessment of suppliers using scans and digital questionnaires. You receive a standardized, objective security score that makes the risks in your supply chain transparent. This saves up to 75% of the time compared to manual procedures.
More information about Vendor Risk Management 3. SecurePlus – Compliance Mapping:
SecurePlus enables automated comparison of identified vulnerabilities with regulatory requirements such as NIS2, ISO 27001, TISAX, GDPR, PCI DSS, or NIST. The package is complemented by an AI assistant for faster risk assessment and domain squatting detection to protect against phishing. This makes audit preparation much easier and helps companies identify and manage compliance risks at an early stage.
More information about SecurePlus
4) How does LocateRisk support NIS2?
5) How does LocateRisk differ from other solutions?
6) Does the LocateRisk scan affect the systems?
7) Where is the data processed and hosted?
8) Is personal data processed?
9) How much does a LocateRisk analysis cost?
10) What do I get in the free initial scan?
• A free demo of the evaluation results.
• An insight into the Top 5 vulnerabilities.
• The management overview for forwarding to management or IT service providers.
11) What do I need to consider before starting the security scan?
Questions about External Attack Surface Management (EASM)
1) What is external attack surface management?
2) What are typical vulnerabilities?
3) Who fixes the vulnerabilities?
4) How often can I scan (intervals)?
5) How does prioritization work (CVSS/EPSS)?
6) How does task management work?
7) How are anomalies and changes detected?
8) Can I merge external and internal scans?
• Nessus / Greenbone / OpenVAS
• Qualys
• PingCastle (Active Directory)
• Pentest reports via CSV import
9) Which reports and exports are available?
• Management report (comprehensible summary)
• Detailed report for IT teams (including vulnerability details)
• Action plan / task list (Excel)
• CSV exports of all data
• PDF reports per filter/category
• API connection for SIEM, SOAR, SOC, or ticketing systems (e.g., ServiceNow, Splunk, Sentinel)
questions About SecurePlus (Compliance Mapping, AI Helper, Domain Squatting)
1) What is SecurePlus?
2) Which compliance standards are automatically checked?
3) How does the AI Helper work?
4) How are domain squatting and suspicious domains detected?
5) How does SecurePlus support audits and certifications?
questions Vendor Risk Management (VRM)
1) What is vendor risk management?
2) How does the automated supplier check (scan + questionnaire) work?
3) How do I invite suppliers and how does the registration process work?
4) How much time does VRM save compared to manual inspection?
questions Data protection & legal information
1) Is LocateRisk certified according to ISO 27001 or a similar standard?
2) Is LocateRisk GDPR compliant?
3) What data is processed?
4) How is it legally ensured that no „hacker paragraph“ is violated?
Request your personal Live-Demo now
Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.



