Security
Testing.
Comprehensive security checks to strengthen your IT infrastructure and protect your systems and data from potential attacks.
How effective is your cybersecurity concept?
In a world where digital threats are constantly on the rise, security is of paramount importance. Our mission is to protect your systems and data from potential attacks. With comprehensive security assessments ranging from pentesting to red-teaming, we identify vulnerabilities and provide customized solutions to strengthen your IT infrastructure. Our experienced team uses state-of-the-art techniques and tools to ensure that your applications, networks and systems are optimally protected. In addition, our experts actively shape official penetration test standards. Put your trust in our expertise and let us take your digital security to the next level. Discover our services and find out how we can help you meet your security requirements. Your security is our priority.
Highly qualified tests by our team of experts.
Our cybersecurity experts know the current penetration test standards inside and out, not least because they are actively involved in their design. We guarantee diligence, reproducibility and transparency in our projects. We combine this with creativity and, in our experts, an average of over ten years’ experience as ethical hackers, with numerous certifications.
- OSSTMM (Open Source Security Testing Methodology Manual)
- OWASP Testing Guide
- IS penetration test according to BSI guidelines
- IS web check according to BSI guidelines
- NIST 800-115
- PCI DSS
- ISO/IEC 27008 Technical Compliance
- TIBER-EU Framework (TIBER-DE) Threat Intelligence-based Ethical Red Teaming
- i-Kfz minimum security requirements
- IEC 62443-4-2 TeleTrusT test scheme
- Smart Meter Gateway penetration tests (BSI TR 03109-6 & TR 03145-1)
- Configuration audits according to manufacturer or internal specifications
- Office IT (servers, clients, printers, etc.)
- Telecommunications IT (fax, VoIP, PBX, hard- and softphones, etc.)
- Applications (web, client applications)
- Network technology (firewalls, IPS/IDS, routers, switches, WLAN, Bluetooth, VPN)
- Operating systems (Windows, Linux, bsd-based or unixoid such as AIX, etc.)
- Virtualization solutions, directory services, network storage
- Critical infrastructures and industrial Ethernet (OT, ICS, SCADA, PLT, PLC, SPS, DPC, RTU, smart meters)
- Cloud-based solutions
- Networks classified as RESTRICTED or SECRET
Key Benefits.
High discretion
We operate with the utmost care and confidentiality as required for top-secret environments. Our Ü3 security-cleared testers provide secure VSA-compliant hardware and processes.
Recognized standards
Our experts contribute to the implementation of internationally standardized methods such as the Open Source Security Testing Methodology Manual and BSI IT baseline protection.
Individual solution consulting
We place a strong focus on delivering actionable results that are tailored to your specific needs. We also provide you with comprehensive advice on the implementation of technical countermeasures.
BSI-certified IT security service provider
We enjoy the full confidence of the BSI and our services meet the highest quality and security requirements in the field of IS penetration testing.
Industry experience.
- Public administration
- Defense
- Critical infrastructures
- Automotive industry
- Aviation
- Financial services
- Telecommunications, media, technology (TMT)
- Healthcare
- Trade / eCommerce
Let’s get in touch!
Contact our cybersecurity experts. Together we will find a customized solution to protect your highly sensitive data.