Penetration Tests

All penetration tests are carried out thoroughly and manually by certified Ethical Hackers (CEH). Tests, where countermeasures have been taken, are delivered with a valid certificate. See here the different possibilities:

CORPORATE NETWORK

A penetration test on your corporate network shows whether hackers can penetrate your internal network. It also checks whether rogue employees or visitors can misuse data from within.

WIFI

Through a wireless connection, hackers can easily get on your network. The signal can be picked up outside by criminals, so they can work remotely and quietly without being noticed.

WEB APPLICATIONS

Websites, e-shops, portals or CRM systems are a gateway from the internet to sensitive data on your internal company network. Our pen test finds all vulnerabilities and advises the necessary countermeasures.

MOBILE APPLICATIONS

Mobile apps also process sensitive data and are linked to other (web) services in various ways. A penetration test examines all possible connections of the devices and services.

SECURITY AUDITS

A penetration test is often a mandatory part of a certification or compliance process. Just think of the ISO 27001 certification. During this pen test, it is checked whether your company meets all the requirements.

SCADA

Industrial systems such as SCADA are increasingly being linked to the Internet and corporate networks. Usually, they do not have optimal security, making them an interesting target for hackers.

Hacking facts and figures

Hacking is a serious problem for companies.

days it takes on average for a hack to be discovered
% of all hacking attacks can be easily prevented
% of digital burglaries have been patchable for more than 1 year

Immediately request a quote?

Not really sure yet?

Visit our contact page, we will be happy to contact you!