Code is running in your IT that no one knows.
Business-critical and uncontrolled
At some point, someone built an Excel file that creates the month-end closing at the push of a button. Or an Access database that processes orders. These macros are still running today. What exactly they do is often no longer known.
VBA macros can do more than format spreadsheets. They can read files, send data, and modify systems. Emotet, TrickBot, and Ryuk used exactly this route.
Customized IT security
Office VBA Security & Compliance
From overview to control
01 Creating transparency

Knowing what is actually running in the company
OVSC scans your network and shows you which VBA macros exist, where they are located, what they do, and who created them.
02 Assess risks

Understanding which macros are critical
Not every macro is dangerous. OVSC analyzes the code and shows which macros are harmless and which pose a risk.
03 Establish control

Only verified code may be executed
Verified macros are signed. Only signed macros are allowed to run; everything else is blocked. The backdoor is closed.
04 Secure changes

Detect manipulation immediately
If a macro is modified, OVSC detects it immediately. You maintain control, even when changes occur.
Scalable as needed
Office VBA Security & Compliance (OVSC) is modular. The packages differ in functionality and depth of control depending on requirements and organizational size.
Standard
Control for operational use.
Scanning, analysis, and signing of VBA macros in your Office environment. For IT departments that want to actively manage macro security.
Premium
Extended control for operational use.
The complete package for complex or regulated environments. Advanced analysis, control features, and workflow support.
Enterprise
Comprehensive security and central control.
Combines VBA macro security with PowerShell control. For organizations that want to secure executable code across their entire Microsoft environment.
Insight into
real projects
We are all about security, and although many companies have great difficulties with this, almost nobody wants to talk about it. It makes sense, doesn’t it?
After all, our clients include public administrations and renowned companies.
We will be happy to tell you more in person.
21,000 employees
Situation: The cyber insurance company asked questions about macro security. The IT department was unable to answer because no one knew which VBA macros existed. At the same time, the board of directors requested a status report following a ransomware attack in the industry.
Step 01
Step 02
automatically analyzed
Step 03
potentially dangerous
Result: proWare Solutions brought clarity where there had previously been uncertainty. The board received its report, the insurance company got its answers, and IT now has an overview it never had before.
30,000 employees
Situation: A DAX company with nearly 30,000 employees wanted clarity regarding its macro landscape. OVSC scanned and analyzed the entire Office environment.
Step 01
Step 02
automatically analyzed
Step 03
potentially dangerous
Result: proWare Solutions provided clarity where there was previously uncertainty. Critical macros were identified and blocked, while non-critical ones were approved for execution.
6,000 employees
Situation: The IT department knew that VBA macros were in use but lacked an overview of their quantity, storage locations, and functions. OVSC was tasked with creating this transparency.
Step 01
Step 02
automatically analyzed
Step 03
potentially dangerous
Result: A complete overview of all VBA macros in the environment. Critical macros identified, non-critical ones approved for execution.
The easiest
start: Transparency
A free scan shows in minutes which VBA macros exist in your environment and where potential risks lie. Non-binding, discreet, and without prior consultation.
This is how we create control.
These situations don’t arise from bad decisions, but because no one has looked closely for years. This is exactly where we start – not with prohibitions, but with structure.





