How secure is your company?

In today's world, the IT security situation is subject to continuous change. New types of vulnerabilities that can pose a threat to the security of your IT landscape become public almost daily. Therefore, put your IT infrastructure to the test together with our security experts and get ahead of the cyber criminals.

In the course of the vulnerability assessment, the following test points are carried out after the scope has been jointly defined, taking into account the recommendations of the BSI practice guide "IS penetration test":

  • Identification of the accessible systems, protocols and network services
  • Identification of the software and versions used
  • Examination for known vulnerabilities and testing for insecure configuration settings

Selective in-depth investigation of selected systems and applications on the basis of the collected findings.


Do you have any questions? The "Managed Services" team will be happy to help you.

Write to us

Christian Bohr
Head of Managed Services Consulting

Write to us