External Penetration Test
In an external penetration test, systems and applications that are accessible from the Internet are checked for security risks. Both server systems and concrete web applications can be tested for vulnerabilities.
The number of hacker attacks on the digital infrastructures of companies - regardless of their respective size or industry - is increasing every day. The external infrastructure of companies is particularly at risk, as attacks are carried out by cyber criminals worldwide and are usually completely automated. Due to the extensive threat situation and diverse attack possibilities, a regular external penetration test is necessary in addition to a continuous vulnerability scan.
Contact us for an individual offer if you would like to have your company's external infrastructure checked for security risks.
Internal Penetration Test
In an internal penetration test, systems and applications that are located in an internal network are checked for security risks. For example, servers, routers, telephone systems, printers and desktop computers in company networks are tested for vulnerabilities.
According to a recent representative study by the digital association Bitkom, 9 out of 10 companies are
victims of cybercrime. Every tenth company sees its existence threatened due to the financial damage.
Due to the size and diversity of systems and applications in internal networks, there are numerous opportunities for potential attackers to harm companies. An attack on company networks can even occur unintentionally, for example when employees connect devices infected with malware or unknowingly install a Trojan.
Inadequate security measures can lead to sensitive information being tapped, deleted or manipulated during an attack. If critical systems are damaged, companies may even be unable to act.
As part of an internal penetration test, we identify the weak points in your internal infrastructure and advise you on how to improve the level of security in your company.
An attack simulation is a special form of penetration testing in which a real hacker attack is simulated. In contrast to a pentest, it is designed to be as discreet as it can be, exploiting discovered vulnerabilities to gain access to as many systems in the infrastructure as possible.
Both external and internal attacks will be simulated. By simulating a real threat, we put the company processes as well as the employees in different areas to the test.
If you would like to know what chances hackers have to penetrate your company, spread through the network and what potential damage they could cause, contact us.