Make an appointment
So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.
Penetration test

Key Facts
- Penetration test
- Vulnerability scan
- Exploiting
Categories
- Penetration tests
- Vulnerability and patch management
- Consulting IT security
Key Facts
- Penetration test
- Vulnerability scan
- Exploiting
PRODUCT DESCRIPTION
To ensure core security, we offer penetration tests in accordance with the BSI Practice Guide for Information Security Penetration Tests. For these tests, we always recommend that our clients perform them after white-box testing.
Due to the lack of information, vulnerabilities can be overlooked during black box testing. Therefore, there is a risk that scenarios such as an attack by an informed internal perpetrator are not taken into account in the context of a blackbox test. Additionally, there is a higher, entirely avoidable risk of causing unintended damage during a blackbox test. For all exploits and vulnerabilities found, an action plan is provided following the test. Show More
Due to the lack of information, vulnerabilities can be overlooked during black box testing. Therefore, there is a risk that scenarios such as an attack by an informed internal perpetrator are not taken into account in the context of a blackbox test. Additionally, there is a higher, entirely avoidable risk of causing unintended damage during a blackbox test. For all exploits and vulnerabilities found, an action plan is provided following the test. Show More