This page is fully or partially automatically translated.
We have many years of experience in the field of audits and penetration tests. Our consultants regularly attend international hacker conferences and research weaknesses themselves. This enables us not only to examine your IT solutions for potential security risks on a conceptual level, but also to find actually existing technical and organizational vulnerabilities and to evaluate them appropriately. We know the current attack techniques and methods and regularly find unknown vulnerabilities in standard software. A penetration test with us goes far beyond a standard scan, depending on your requirements. Thus, we repeatedly find vulnerabilities in supposedly secure systems and applications that other auditors have overlooked. This way you can ensure that you find your vulnerabilities and close the gaps before an attacker finds and exploits them. Examples of auditing aspects: * Security of web applications, web services and portals * Source code checks * Testing mobile apps and embedded devices * Network reviews/audits * WLAN reviews/audits * Cloud Check * Testing of mobile devices * Insider analyses * Review of the ISMS, review of processes or guidelines * Structural analysis of DMZ structures * System security and hardening of servers and end devices * Data protection audits in the context of IT security * Social Engineering * Testing of special devices, embedded systems or the customer's own products * Red Team Exercises * 360 degree attack simulation * War-Game (Red Team vs. Blue Team) * Verifying the security of applications, services and data in the cloud * Mobile App Threat Assessment * Review of ICS environments Translated with www.DeepL.com/Translator (free version)Show More