Skip to Content

Penetrationtest

The ultimate test for your IT security landscape.



  Targeted vulnerability analysis through realistic attack simulations


  Individual reports with clear recommendations for action


  Lasting optimization of the IT security landscape

Penetrationtest

The ultimate test for your IT security landscape.



  Targeted vulnerability analysis through realistic attack simulations


  Individual reports with clear recommendations for action


  Lasting optimization of the IT security landscape

One of the most effective methods of assessing an organization's security status is penetration testing – a targeted security audit conducted by experts to uncover potential gaps in IT infrastructures.


Our experts test your company for vulnerabilities – using the same tools, tactics and procedures (TTP) as real attackers, as well as strategic testing and consulting. Based on our many years of experience and expertise in the areas of offensive and defensive security, we offer you targeted recommendations and solutions to identify and minimize your attack surface.

What gaps does your IT infrastructure have?


SECURITY FACTORY | IDENTIFY | PENETRATIONTEST

The human factor

People remain a central component of many security vulnerabilities. As part of penetration tests, we not only examine technical vulnerabilities, but also the security of your employees when dealing with digital threats. Controlled phishing and spear phishing campaigns allow us to simulate real attack scenarios in order to measure and strengthen security awareness in a targeted manner. In this way, we identify weaknesses in processes and communication channels – before a real attacker does.

Our Pentesting Services



External Penetration Test

Testing of the network perimeter, i.e. IT services accessible via the public Internet

Web Application Penetration Test

Specific analysis the security of a web-based application

USB Drop Assessment

Simulation of a realistic attack using specially prepared USB sticks

Cloud Assessment

Checking the cloud infrastructure for security vulnerabilities and misconfigurations

Internal Penetration Test

Testing of the internal network involving a “assume breach” approach

White-Box (Web) Application Penetration Test

Additional examination of the source code of the application for security gaps and vulnerabilities

Stolen Asset Assessment

Checking the security of a stolen device, such as a company laptop

Microsoft 365 Audit

Checking the Microsoft 365 and Entra ID configuration for security vulnerabilities and misconfigurations

Spear Phishing

Specific attacks on users via email

Mobile App Assessment (Android)

Uncoverage of potential vulnerabilities in Android applications

WiFi Assessment

Uncoverage of vulnerabilities in a WiFi infrastructure

Red Team Assessment

Simulation of a realistic attack to test the organization's overall security situation

Catalog of Services

For more information about our pentesting services, please refer to our comprehensive service catalog.

Pentesting is a continuous cycle that follows a company. New vulnerabilities can appear anywhere and at any time. The constant development in the security sector requires a recurring review of the IT system landscape. In addition, the human factor can also represent a major security gap. In addition, you will gain more clarity about the security of your company in the event of an attack. Important requirements from frameworks (e.g. CIS Control 18) and regulations (e.g. NIS2 and DORA) are also addressed.


The pentest makes it possible to obtain a detailed picture of the digital attack surface and thus improve IT security in a targeted manner. The result can serve as a basis for investment decisions, allowing targeted investments to be made based on the results.

Why Pentesting?

Pentesting procedure


1 |

Kick-off meeting

Analysis of the status quo, our team agrees the aim and scope of the pentest with you.

| 2

Reconnaissance / Intelligence Gathering

Information gathering; the aim is to obtain a complete overview of the digital attack surface.

3 |

Vulnerability Assessment

We carry out scans and check the identified vulnerabilities.

| 4

Exploitation

The actual attack on your IT system begins. The previously identified vulnerabilities are actively used to penetrate the system broadly and gain extended rights.

5 |

Report & Documentation

The vulnerabilities found are classified according to their risk and a catalog of measures is drawn up to eliminate the security issues.

What do you get at the end of the assessment?


 Detailed overview of your vulnerabilities (including software, configuration and design)

 Tried and tested recommendations for suitable preventive measures

Benefits of our pentesting reports


 Clearly structured and concise scope

 Intuitive structure for quick orientation


​ Concise management summary for decision-makers


 No standard reports – created individually and manually


 Available in German or English – depending on individual requirements


 Segmentation, e.g. by location or business unit


 Specific, actionable recommendations for each weak point


 Flexibly expandable according to individual requirements

Pentesting without pentesters?

In contrast to manual tests, autonomous pentesting runs continuously, automatically and without external pentesters. Security gaps are quickly identified, prioritized and rectified - ideal for bridging the gap between classic pentests. In this way, you constantly minimize your attack surface and are faster than the attacker.



Can we assist you?

Our experts are happy to support. Get in touch with us!