Vulnerability Analysis and Penetration Testing

With our vulnerability management you have an efficient opportunity to identify, analysis and evaluate possible IT weak points. A vulnerability scan supplies essential knowledge for the evaluation of the current risk situation and the effectiveness of measures which have already been taken. Our penetration tests provide a reliable assessment about the security status while considering all the factors which could influence security: applications, systems, networks and users.

Our approach will cover:

  • Architecture Review
  • Information Gathering
  • Check of applications and IT systems
  • Check of Clients, e.g. PC, Notebook, Tablet and mobile phone
  • Wireless and wired network check
  • E-Mail- and Internet-Malware test
  • Internal and external Penetration Tests

Our experienced and certified ISO 27001 Lead Auditors provide you with high quality advice on information security management (ISMS) and support you with the roll-out and streamlining of ISMS based on ISO 27001.