Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Hall 7A / Booth Number 7A-126

Penetration Tests


Consulting IT security Cyber-physical systems security Web application security Network security Application security

Key Facts

  • External- and internal Penetration Testing
  • Application Pentesting / Social Engineering
  • Expert Knowledge for Special Requirements

Product Description

A penetration test is a simulated cyberattack that detects vulnerabilities and identifies strengths. You will receive concrete recommendations for improving your cybersecurity based on these insights. How We Proceed Before our specialists get started with the actual penetration tests, we will analyze possible threats to your company. Where do potential attackers come from? Where are the weak spots likely to be identified? Together with you, we will decide on the best method – whether we choose the black box or the white box approach, for example.Depending on the approach, we will ask you about the products and technologies used so that we can tailor and target our analysis the best way possible. To increase cost efficiency, it is often a good idea to combine the penetration test with a security review. You Will be Informed It is important to us to proceed with as much transparency as possible. You, or those responsible in your company,will always be updated on our actions, progress, and recent findings. This will allow you to distinguish between real attacks and our test actions, or initiate immediate measures for critical findings. Which Pentest? Depending on your requirements, we will conduct external and internal penetration tests or audit your company by means of social engineering. In these tests, we not only rely on conventional methods, but also use the latest techniques by incorporating current research results into our testing procedures. Final Report After completion of the penetration test, our specialists will present the findings to your team and discuss remainng questions as well as the next steps to be taken. The reporting will be adjusted to your needs. Following that, we support diverse formats and ratings. We will provide a reproducible test documentation including the test details. Moreover, we will also give practical advice on how to eliminate vulnerabilities so that attackers no longer stand a chance.
... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.