First of all, we will get to know you and your company in a personal conversation, either on site or by telephone. In order to get an idea of the required measures as well as your current state of IT security.
- First Meeting
- To get to know each other
During the planning phase, our team creates a tailor-made Penetration Test plan. Furthermore, the methods to be used and the procedure are defined with all the participants. We are also happy to answer any questions you may have about the security audit and its procedure.
In the most important step of our Penetration Test service, our experts will execute the actual hacker attack on your systems or applications specified in the planning phase, and will try to identify any potential vulnerabilities.
- Conducting the Penetration Test by our experts
As part of the documentation, we will review the weaknesses that we encountered during execution and draw up a risk assessment and a proposal catalog. We may come to you in this step for further inquiries. Attached is also an exact documentation of all steps performed during the execution.
- Risk Assessment
As a final step, there is a detailed final report and, as desired, an additional personal meeting to present the results and to point out our suggestions for improvement. A revision test to check whether the vulnerabilities found in the previous steps have been successfully completed, or a sensitization training of their employees can follow on request.
- Results Presentation
- Final Report