We assess the IT security level in your company from two different perpectives: SySS security tests comprise the connection of the internal network with the internet as well as the specific internal infrastructure, thereby covering the most possible range of attack scenarios.
Which outcomes will be achieved by a penetration test?
The following diagram illustrates the modular structure according to which we conduct a penetration test. The approach is documented in detail in our White Paper.
For each project carried out, you will receive a detailed written documentation. In this test report, we present the test results as well as a description of the test procedure and the tested objects. Therefore, the documentation serves as a comprehensive basis for the elimination of vulnerabilities. In a two-step quality assurance process, the report is reviewed for technical and linguistic accuracy.
Given the dynamic nature of IT systems and networks, security risks and gateways change over time. Hence, a penetration test is only a snapshot of the current security standard. If required changes are implemented in response to a penetration test, we strongly recommend an follow-up examination. We thereby determine the security impact of implemented changes on your system and check whether there are any remaining or potential new issues.
Analysis of, e.g., your IP address ranges that are accessible via the internet or selected internal systems
Analysis of your systems from the local network, e.g., "the cleaning staff/intern scenario", client, VoIP, VLAN, Active Directory, SAP analysis, testing of production systems and critical infrastructure
In-depth security test of mobile apps and devices (e.g., iOS, Android) as well as mobile device management solutions