Process of the test
- First, we discuss the subject of the investigation together, e.g. within the scope of a walkthrough through your application or your target environment. Based on this walkthrough, we estimate the individual effort for your investigation.
- Our IT security experts conduct the investigation.
- We will present the results to you during a results meeting and you will receive a detailed report on the findings.
We do not leave you alone with the results
Very important: If required, you will receive comprehensive explanations of the vulnerabilities found, and we will also accompany you during the remediation process if desired.
In all our reports, we attach great importance to understandable language that allows even those less experienced in security technology to draw the necessary conclusions from the reports.
Good to know
The regular performance of penetration tests and vulnerability scans not only fulfills key requirements from frameworks such as ISO 27001; it is also an essential technical and organizational measure within the meaning of the General Data Protection Regulation (GDPR) that contributes to the protection of personal data.