PENTESTS



Can attackers penetrate your systems? We assume the role of a hacker on your behalf. More than 900 businesses already trust in out results. usd pentests involve much more than just automated security scans. During these tests, our security analyst assumes the role of a hacker – on a legal basis, of course. Our security analyst utilises professional tools to obtain information and also tries to penetrate a company’s IT systems using a targeted, individual and creative approach. This simulated hacker attack provides high-quality results that we summarise for you in a report that includes specific recommendations for improvement.

POSSIBLE TESTING AREAS

You decide what should be tested. Together with you, we decide on an individual basis what the target and scope of the pentest should be. The following components might be used separately or combined with each other. If you’d like to see something else on this list, don’t hesitate to contact us.

Do you need consulting before the pentest is performed? On defining testing criteria? To support you with operational planning and Organisation? On managing/controlling your service providers?

Learn more

OUR APPROACH

YOU HAVE A LARGER ENVIRONMENT?

Our Pentest Service Management will support you in preparing for and conducting your pentests – via our platform usd Security Connect.

Learn more

PENTEST FACTS