Simulation of real attacks from the internal network
Identification of vulnerabilities before attackers exploit them
Early detection and elimination of gaps is cheaper than the cost of potential damage
Many industry standards (e.g. ISO 27001) require regular pentests
Our reports are technically precise yet clearly formulated - for confident decisions at all levels
Features | Basic module | Comprehensive module |
---|---|---|
Focus Active Directory | ||
IoT and OT systems | img/icons/cross. svg | |
Comprehensive network analysis | Limited (only AD relevance) | Complete check of the entire network |
Final report | Detailed, AD-specific | Detailed (incl. network, IoT & OT) |
Our experts first agree the scope and objectives of the test with you. We then check your IT infrastructure step by step for potential vulnerabilities. At the end, you will receive a detailed report including recommendations for action.
Generally not. We try to plan the test in such a way that your normal work processes remain as undisturbed as possible. Critical steps are carried out in close consultation with you.
At least once a year or after major changes to your IT infrastructure. This ensures that new systems and updates are just as secure as existing ones.
For companies with less complex networks or if the focus is on the Active Directory, the basic module is often sufficient. However, as soon as IoT or OT components are added or if the network is very diverse, the Comprehensive module is recommended.
Of course. We will take the time to answer your questions and go through the report with you. We also offer workshops or additional support services on request
Selbstverständlich. Wir nehmen uns Zeit, um Ihre Fragen zu beantworten und den Report mit Ihnen durchzugehen. Darüber hinaus bieten wir auf Wunsch auch Workshops oder zusätzliche Support-Leistungen an.