Everyone has a weakness
We discover yours
Have your IT systems assessed
With our comprehensive vulnerability analysis, we check the security of your IT systems before attackers discover potential security loopholes while you suffer the consequences.
Certified penetration testers scan, document and present the points of attack found in your IT infrastructure so that a sustainable security strategy can be ensured. In practice, identifying and classifying risks is not enough. Rather, it requires sustainable and adequate resources to contain the risk and to draw effective lessons from it. Therefore, our weak point analysis is targeted in companies, where project managers have a specific room for maneuver and the level of security can be significantly increased.
Why do I need this?
Almost every company nowadays works with interfaces to the Internet, regardless of whether you operate a website or a web shop or you grant your employees VPN access – there are potential points of attack and weak points in your systems everywhere.
IT security not only affects corporations and large companies, but also medium-sized and small businesses. With our IT vulnerability analysis, we offer a well-founded solution for medium-sized to smaller companies in particular, which reveals gaps in your IT structure.
Vulnerability analysis or Pentest?
Basically, both methods are used to check the resilience of your IT infrastructure.
In a vulnerability analysis (figure above), security gaps are identified and documented using automated processes. The results are then manually validated by our penetration testers (“false positive”) in order to rule out test errors. All documented weak points are compiled and presented to you in a report.
A penetration test (image below) is individually adapted to your IT structure and consists of several manually carried out measures. The results of different weak point analyzes of the respective systems are used as a basis to exploit potential points of attack and to penetrate deeper into the IT structure.
The Vulnerability Analysis is therefore more of a superficial method, while the penetration test goes deeper into the IT structure.
Our IT vulnerability analysis
Our vulnerability analysis uses automated procedures to identify and document your weaknesses – this not only saves time but also money. These results are presented to you later and can be used as a basis for further penetration tests (short “pentests”).