Penetration test
Attacks on IT can cost companies dearly: Production or service downtimes, the loss of customer data or industrial espionage not only result in monetary burdens, but can also have a negative impact on the company's image. Therefore, there is no way around effective security measures. Our experts use penetration tests or security audits to determine whether a company already has sufficient security measures in place and make specific recommendations for optimizing information security.
We show clearly and in detail the state of IT security in the test object, the consequences and risks for companies, and the approaches that can be used to establish adequate and effective security.
Customized penetration tests
Customized penetration tests have proven to be an effective tool for security assessments and preventive protection of web applications, software and IT infrastructure as part of targeted vulnerability analyses. The individual requirements of a company are our benchmark. As early as the quotation phase, we work with the customer to define criteria such as scope, aggressiveness, technology, the type of test (black box or white box test), and other framework parameters.
Your contact
Thomas Soens
Division Manager
msg security advisors
How we can support you
Our five-step approach to penetration testing provides a perfect balance between effectiveness and efficiency, allowing flexible deployment of the most appropriate standards.
Agreement on objectives, timeframe, type of test, and contact person. In the case of a whitebox test, we review existing documents and, if necessary, interview those responsible for the product.
To this end, we perform initial scans and gather information from public sources.
We analyze the collected data and plan the further procedure on this basis.
We test the various vulnerability categories with simulated intrusion tests, in some cases using tools we have developed ourselves.
We evaluate and document the results of the controlled attack. On this basis, we create a prioritized catalog of measures and make possible risks and threats transparent in a results report with a management summary.