Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Service

Penetration Testing and Cyber Security Checks

Key Facts

  • Advanced Penetrations Tests
  • Cyber Security Checks according to ISACA guidelines
  • Security and Risk Assessments

Product Description

Our penetration tests and cyber security checks serve to uncover possible weak points and security gaps in your IT systems. Infrastructure penetration tests are used to get an overview of all existing risks and potential weak points. During a penetration test from the Internet, we check your firewall systems, VPN access, mail server and your entire network structure that is accessible from the Internet. In an internal penetration test, domain controllers, file servers, internal web servers, but also peripheral devices such as printers and power supplies are our primary target. Web applications and web-based APIs have become an integral part of most business processes today. The potential damage in case of a compromise is extremely high. During our penetration tests for web applications, we check threats in web applications as well as web-based APIs. We are guided by the OWASP recommendations for penetration testing and the OWASP Top 10. We also have many years of experience in testing industrial control systems, process control technology and process data networks as well as SCADA and embedded systems. OPC, BACnet, KNX are well-known protocols. We also know the requirements of IEC 62443 in detail.
... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.