During a security assessment (also known as a penetration test / pen test), we thoroughly examine your application and production environment.
We help your team find vulnerabilities and come up with practical solutions. We are specialized and certified in fully screening software from every conceivable angle.
Our web application assessments go through these phases:
Conversation
We start with a discussion about the collaboration and test approach.
Examination
We get to know your web applications well and examine all functionality and links. With your consent, we also dive deep into the code to get the most complete picture possible.
Assessment
A certified employee conducts the security screening according to the guidelines of OWASP with several test methods. This assessment is mostly "manual work" whereby we test your applications interactively via an attack proxy.
Documentation
We document our findings and personalized advice with code examples in a detailed test report.
Handover
We hand over the report, discuss the main points with you and think along about pragmatic solutions.
Aftercare
We remain available to you for questions, retests and advice.
Do you want permanent assurance about the secure setup of your servers or sites? Contact us now for a non-committal introductory meeting.