{"id":40183,"date":"2023-06-02T11:17:45","date_gmt":"2023-06-02T09:17:45","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=40183"},"modified":"2026-04-08T09:25:51","modified_gmt":"2026-04-08T07:25:51","slug":"pentest","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/pentest\/","title":{"rendered":"Pentest"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" fullwidth=\"on\" disabled_on=\"on|on|off\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_fullwidth_slider _builder_version=\"4.27.6\" max_height=\"350px\" custom_padding=\"80px||80px||true|false\" hover_transition_duration=\"2000ms\" global_colors_info=\"{}\"][et_pb_slide button_text=\"We are happy to help\" button_link=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" _builder_version=\"4.27.6\" header_level=\"h1\" header_text_align=\"center\" header_text_color=\"#F07F1D\" header_font_size=\"56px\" body_font=\"|300|||||||\" body_font_size=\"30px\" body_line_height=\"1.4em\" background_enable_color=\"off\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-analysis-pentest-header.jpg\" background_enable_image=\"on\" background_blend=\"overlay\" button_text_size=\"20px\" button_text_color=\"#F6F6F6\" button_border_width=\"1px\" button_border_color=\"#F07F1D\" button_font=\"Roboto|300|||||||\" button_use_icon=\"off\" button_alignment=\"center\" text_orientation=\"center\" width=\"60%\" max_width=\"1080%\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h1><span style=\"color: #f07f1d;font-size: 190%;font-weight: 300;margin-bottom: 20%\">Pentest<\/span><\/h1>\n<h2><span style=\"color: #fffff;font-size: 120%;font-weight: 300;line-height: 120%\"><\/span><\/h2>\n<h2><span style=\"color: #fffff;font-size: 120%;font-weight: 300;line-height: 120%\">We Find Vulnerabilities in Your IT Infrastructure and Reduce Your Risk<\/span><\/h2>\n<p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-analysis-pentest-header.jpg\" custom_padding=\"91px||91px||true|false\" locked=\"off\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"80%\" max_height=\"350px\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" text_font_size=\"20px\" text_line_height=\"1.4em\" header_font=\"|300|||||||\" header_font_size=\"30px\" background_layout=\"dark\" custom_margin_tablet=\"\" custom_margin_phone=\"\" custom_margin_last_edited=\"on|tablet\" custom_padding_tablet=\"\" custom_padding_phone=\"\" custom_padding_last_edited=\"on|desktop\" header_font_size_tablet=\"25px\" header_font_size_phone=\"\" header_font_size_last_edited=\"on|tablet\" global_colors_info=\"{}\"]<\/p>\n<h1 style=\"text-align: center\"><span style=\"color: #f07f1d;font-size: 190%;font-weight: 300;margin-bottom: 20%\">Pentest<\/span><\/h1>\n<h2><span style=\"color: #fffff;font-size: 120%;font-weight: 300;line-height: 120%\"><\/span><\/h2>\n<p style=\"text-align: center\"><span style=\"font-size: 120%;font-weight: 300;line-height: 120%;color: #ffffff\">We Find Vulnerabilities in Your IT Infrastructure and Reduce Your Risk<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#F07F1D\" use_background_color_gradient=\"on\" background_color_gradient_direction=\"153deg\" background_color_gradient_stops=\"#f07f1d 0%|#f8ab22 100%\" background_color_gradient_start=\"#f07f1d\" background_color_gradient_end=\"#f8ab22\" custom_padding=\"0%||0%||false|false\" background_color_gradient_stops_tablet=\"#f07f1d 0%|#f8ab22 100%\" background_color_gradient_stops_phone=\"#f07f1d 0%|#f8ab22 100%\" saved_tabs=\"all\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row admin_label=\"Zeile\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|12px|auto||\" custom_padding=\"0px||3px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" button_text=\"We are happy to help\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"14cdac1e-928d-489e-a145-4005439caaa9\" button_text_size=\"140%\" button_text_color=\"#FFFFFF\" button_bg_color=\"RGBA(0,0,0,0)\" button_border_width=\"1px\" button_border_color=\"RGBA(255,255,255,0)\" button_use_icon=\"on\" button_icon=\"&#xf0e0;||fa||900\" button_icon_color=\"#FFFFFF\" button_icon_placement=\"left\" button_on_hover=\"off\" button_text_size_tablet=\"\" button_text_size_phone=\"\" button_text_size_last_edited=\"on|phone\" button_icon_tablet=\"\" button_icon_phone=\"\" button_icon_last_edited=\"on|tablet\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.20.2\" _module_preset=\"default\" custom_padding=\"||0px|||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"||||false|false\" custom_padding=\"0px|||||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.20.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Protect Your Company Proactively with Penetration Testing from usd AG<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"85%\" custom_padding=\"0px||32px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<div class=\"x-text\">\n<p>In our Pentests, our <a href=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" target=\"_blank\" rel=\"noopener\">security analysts<\/a> assume the role of a malicious hacker and simulate attacks on your IT system landscape. They attempt to penetrate your company's systems in a targeted, individual and creative manner using the same methods, techniques and procedures that attackers would use. The goal is to find as many vulnerabilities and attack points as possible so that you can fix them in time before they can be exploited by a real attacker. Conducting a Pentest ensures that your partners and service providers comply with a wide range of regulations. With <a href=\"https:\/\/herolab.usd.de\/en\/\" target=\"_blank\" rel=\"noopener\">usd HeroLab<\/a>, you have one of the leading providers of technical security analyses by your side.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Customers Who Already Trust Us<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" use_background_color_gradient=\"on\" background_color_gradient_direction=\"100deg\" background_color_gradient_stops=\"#0a0a0a 0%|#086f7a 100%\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-AG-Pentest-Workstation.jpg\" background_blend=\"soft-light\" custom_padding=\"5px||2px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_slider _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" custom_padding=\"70px||70px||true|false\" global_colors_info=\"{}\"][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cCompetent, structured, friendly.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">\u00a0Claudia Mertzlin, Lufthansa<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 130%;font-weight: 300;font-size: 20px\">\u201cAs a provider of modern mental health solutions, we are constantly developing our digital consulting and support services\u2014and thus assume a special responsibility for the protection of sensitive data. We are aware of how crucial trust and data security are for our customers and clients. That is why we attach great importance to ensuring that our systems meet the highest security standards. usd AG has provided us with extremely competent and efficient support from the very beginning. We would like to thank them for their excellent cooperation and expert advice.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Markus Bernhardt, Project management and IT-coordination, INSITE-Interventions GmbH<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cTrustworthy, professional and helpful.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Manuel Sommer, Pulso Europe Portugal<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cGreat and effective service!\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">\u00a0Filipe Sommer, Pulso Europe Portugal<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cProfessional, needs-based, good communication, careful implementation, short-term implementation, customer-oriented.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Anonymous customer<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">To the point \ud83d\ude09 - Good cost\/performance ratio, constructive and friendly communication, professional execution.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Anonymous customer<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cStructured, competent and simply recommendable.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Anonymous customer<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cProfessional, detailed, communication done correctly from beginning until the end.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Anonymous customer<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cThank you for the quick pentest, driven by our very ambitious timeline! Top!\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Anonymous customer<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cThank you, everything went excellently again.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Anonymous customer<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cWe are extremely satisfied and will be happy to recommend usd AG.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Anonymous customer<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<h3 style=\"text-align: center;color: #ffffff;line-height: 150%;font-weight: 300;font-size: 30px\">\u201cThank you for once again conducting a smooth and structured pentest of one of our applications, as well as for the good cooperation.\u201d<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;color: #ffffff\">Anonymous customer<\/p>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|off\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#F6F6F6\" width=\"100%\" custom_padding=\"0px||0px||false|false\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"80%\" custom_margin=\"30px||||false|false\" custom_padding=\"49px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>\u00a0Pentest Portfolio of usd AG<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-system-kachel.jpeg\" title_text=\"usd-herolab-pentest-system-kachel\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>System Pentest<\/h2>\n<p><strong>Servers and network components<\/strong><\/p>\n<p>You want to ensure that your network is protected against attackers on the infrastructure level?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-systems\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-web-application-pentest.jpeg\" title_text=\"usd-herolab-web-application-pentest\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Web Application Pentest<\/h2>\n<p><strong>Web applications<\/strong><\/p>\n<p>You run an online store and would like to protect yourself preventively against cyber attacks?<\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-webapplications\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||7px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-ai-llm-pentest-kachel.jpg\" title_text=\"usd-ag-ai-llm-pentest-kachel\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Pentest AI\/LLM Systems<\/h2>\n<p><strong>AI and Large Language Models <\/strong><\/p>\n<p>You want to identify security vulnerabilities in your AI solution or LLM-based application?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-of-ai-llm-systems\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.6\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-pentest-api-webservices-kachel.jpg\" title_text=\"usd-ag-pentest-api-webservices-kachel\" _builder_version=\"4.22.2\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>API Pentest<\/h2>\n<p><strong>Interfaces<\/strong><\/p>\n<p>You provide APIs or web services and want to protect against attackers?<\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/api-webservices-pentest\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-mobile-app-pentest-1.jpeg\" title_text=\"usd-herolab-mobile-app-pentest\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Mobile App Pentest<\/h2>\n<p><strong>Android &amp; iOS<\/strong><\/p>\n<p>You provide iOS or Android apps and want to check whether they are sufficiently protected against unauthorized third-party access?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-mobile-applications\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-pentest-active-directory-kachel.jpg\" title_text=\"usd-ag-pentest-active-directory-kachel\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Active Directory Pentest<\/h2>\n<p><strong>Microsoft Directory Service<\/strong><\/p>\n<p>Is your company using Microsoft's Actice Directory for managing user accounts and resources and do you want to check its IT security?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/active-directory-pentest\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-analysis-pentests-kachel-ot-iot.jpg\" title_text=\"usd-security-analysis-pentests-kachel-ot-iot\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Pentest OT and IoT Systems<\/h2>\n<p><strong>Connected Devices and Industrial Infrastructure<\/strong><\/p>\n<p>Operational Technology (OT) and the Internet of Things (IoT) are essential parts of many business processes today.You want to identify vulnerabilities early and secure your systems sustainably?[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/ot-und-iot-systeme-pentest\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-cloud-pentest.jpeg\" title_text=\"usd-herolab-cloud-pentest\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Cloud Pentest<\/h2>\n<p><strong>AWS, Azure &amp; Google Cloud Plattform\u00a0<\/strong><\/p>\n<p>You want to increase the security of your cloud infrastructure (e.g. AWS, Azure &amp; Google Cloud Platform)?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-cloud\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-analysis-kachel-sap-pentest.jpg\" alt=\"SAP Pentest usd AG\" title_text=\"usd-sap-pentest-Kachelbild\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2><span>SAP Pentest<\/span><\/h2>\n<p><strong>SAP systems and FIORI web applications<\/strong><\/p>\n<p>You use SAP systems or FIORI web applications in your company and would like to check their security?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/sap-pentest\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-fat-client-pentest.jpeg\" title_text=\"usd-herolab-fat-client-pentest\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<div class=\"x-text\">\n<h2><span>Fat Client <\/span><span>Pentest <\/span><\/h2>\n<p><strong>Native applications on Windows and Unix systems<\/strong><\/p>\n<p>You use applications or programs from Windows or Unix systems and you would like to ensure that they do not pose a gateway for hackers?<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-fat-clients\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-mainframe-kachel.jpg\" title_text=\"usd-herolab-pentest-mainframe-kachel\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Mainframe Pentest<\/h2>\n<p><strong>Systems and applications<\/strong><\/p>\n<p>Your company regularly processes enormous amounts of data and therefore uses mainframes and you would like to check whether your mainframe is protected against hacker attacks?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-mainframe\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-analysis-kachel-single-sign-on-pentest.jpg\" alt=\"Single Sign-On Pentest, usd AG\" title_text=\"usd-security-analysis-kachel-single-sign-on-pentest\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<div class=\"x-text\">\n<div class=\"x-text\">\n<div class=\"x-text\">\n<h2><span>Single Sign-On (SSO) Pentest<\/span><\/h2>\n<p><strong>Open ID Connect 1.0, OAuth 2.0, SAML<\/strong><\/p>\n<p>You rely on the Single Sign-On (SSO) procedure for user authentication and would like to check the security of your SSO solution?<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-single-sign-on\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|1%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-workstation.jpg\" title_text=\"usd-herolab-pentest-workstation\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2><span>Workstation Pentest<\/span><\/h2>\n<p><strong>Notebooks<\/strong><span><\/span><\/p>\n<p>You want to check whether an attacker can compromise the company network via your employees' laptops?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-workstation\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||7%||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"2%|auto|2%|auto|false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"||0px|||\" global_colors_info=\"{}\"]<\/p>\n<h2><span>More Use Cases Pentests<\/span><\/h2>\n<p><strong>WLAN, VoIP telephone system, Mobile application management, Mobile device management, Business software, and much more<\/strong><\/p>\n<p><strong><\/strong><\/p>\n<ul>\n<li>You are a hardware or software manufacturer and take the protection of your customers' data seriously.<\/li>\n<li>You are a <a href=\"https:\/\/www.usd.de\/en\/security-audits\/swift-assessment\/\">SWIFT<\/a> user and are required to perform a Penetration Test.<\/li>\n<li>You need a successfully performed Penetration Test to conclude a cyber insurance policy.<\/li>\n<li>You wonder if a hacker can successfully compromise the client IT systems through ransomware.<\/li>\n<li>You are in the <a href=\"https:\/\/www.usd.de\/en\/pci-security-services\/pci-dss\/\">PCI DSS<\/a> scope and are required to perform a Penetration Test.<\/li>\n<li>You want to check whether employees can maliciously extend their local user privileges and thus execute a deeper attack.<\/li>\n<li>You want to know if attackers can use phishing emails to attack your employees and gain access to your IT systems.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" url_new_window=\"on\" button_text=\"Contact us\" button_alignment=\"left\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29100 100%\" custom_margin=\"||7%||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_padding=\"||70px|||\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.20.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/grafik-pentestintervall-jaehrlich_en.svg\" title_text=\"grafik-pentestintervall-jaehrlich_en\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.20.1\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>When Was the Last Time You Checked Your It Security?<\/h2>\n<p><span style=\"font-size: 16px\"><\/span><\/p>\n<p>New vulnerabilities are constantly being discovered or changes to the IT environment can lead to new security vulnerabilities. Therefore, Penetration Tests should be repeated regularly over a period of one year and should be firmly integrated into the security process.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"on|on|off\" _builder_version=\"4.21.0\" _module_preset=\"default\" custom_padding=\"52px|||||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>Get More Insights Into the Topic of Pentesting<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_padding=\"0px|||||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"3_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>The approach of usd AG<\/h3>\n<p>Our security analysts have developed a proven procedure for conducting Pentests based on recognized international standards and many years of experience. If you are subject to PCI DSS, we identify relevant vulnerabilities for your PCI DSS v4.0.1 compliance and provide you with details on the affected PCI DSS requirements. The use of the <a href=\"https:\/\/herolab.usd.de\/en\/our-platforms-and-tools\/#toolchain\" target=\"_blank\" rel=\"noopener\">usd HeroLab toolchain<\/a> as well as tools from internationally recognized manufacturers allows our security analysts to perform their tests even more efficiently and comprehensively and leaves time for in-depth, manual analyses.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-approach\/\" url_new_window=\"on\" button_text=\"Learn more\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-kachel-leistung-pentest-2.jpg\" title_text=\"usd-kachel-leistung-pentest-2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-kachel-leistung-pentest-3.jpg\" title_text=\"usd-kachel-leistung-pentest-3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Your advantages of usd AG Pentests<\/h3>\n<p>Fulfillment of your compliance requirements. Optimal support during the entire Pentest project. Comprehensive final report. Documentation of PCI DSS v4.0.1 relevant vulnerabilities and detailed information on the corresponding requirements during PCI DSS pentests and much more. Learn more about your advantages of usd Pentests here.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-benefits\/\" url_new_window=\"on\" button_text=\"Learn more\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_padding=\"||||false|false\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"3_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Pentest provider: Evaluation of offer and quality<\/h3>\n<p>The number of pentest providers is increasing. Thorough evaluation of pentest offerings and quality is becoming increasingly difficult. Learn more here about the performance characteristics that can help you choosing the right partner.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest-provider-evaluation-offer-quality\/\" url_new_window=\"on\" button_text=\"Learn more\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-usd-AG-wie-bewerte-ich-Angebot-und-Qualitaet-eines-Pentest-Anbieters.jpg\" title_text=\"news-usd-AG-wie-bewerte-ich-Angebot-und-Qualit\u00e4t-eines-Pentest-Anbieters\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|on\" _builder_version=\"4.21.0\" _module_preset=\"default\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2>More insights into Penetration Testing<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_padding=\"0px|||||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-kachel-leistung-pentest-2.jpg\" title_text=\"usd-kachel-leistung-pentest-2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>The approach of usd AG<\/h3>\n<p>Our security analysts have developed a proven procedure for conducting Pentests based on recognized international standards and many years of experience. Our security analysts have developed a proven procedure for conducting Pentests based on recognized international standards and many years of experience. If you are subject to PCI DSS, we identify relevant vulnerabilities for your PCI DSS v4.0 compliance and provide you with details on the affected PCI DSS requirements. The use of the <a href=\"https:\/\/herolab.usd.de\/en\/our-platforms-and-tools\/#toolchain\" target=\"_blank\" rel=\"noopener\">usd HeroLab toolchain<\/a> as well as tools from internationally recognized manufacturers allows our security analysts to perform their tests even more efficiently and comprehensively and leaves time for in-depth, manual analyses.\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-approach\/\" url_new_window=\"on\" button_text=\"Learn more\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-kachel-leistung-pentest-3.jpg\" title_text=\"usd-kachel-leistung-pentest-3\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Your advantages of usd usd AG Pentests<\/h3>\n<p>Fulfillment of your compliance requirements. Optimal support during the entire Pentest project. Comprehensive final report. Documentation of PCI DSS v4.0 relevant vulnerabilities and detailed information on the corresponding requirements during PCI DSS pentests and much more. Learn more about your advantages of usd Pentests here.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-benefits\/\" url_new_window=\"on\" button_text=\"Learn more\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-usd-AG-wie-bewerte-ich-Angebot-und-Qualitaet-eines-Pentest-Anbieters.jpg\" title_text=\"news-usd-AG-wie-bewerte-ich-Angebot-und-Qualit\u00e4t-eines-Pentest-Anbieters\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Pentest provider: Evaluation of offer and quality<\/h3>\n<p>The number of pentest providers is increasing. Thorough evaluation of pentest offerings and quality is becoming increasingly difficult. Learn more here about the performance characteristics that can help you choosing the right partner.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest-provider-evaluation-offer-quality\/\" url_new_window=\"on\" button_text=\"Learn more\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"on|on|off\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-fusszeile-kontakt-pentest.jpg\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_padding=\"|||0px||\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" text_orientation=\"center\" global_colors_info=\"{}\"]<\/p>\n<p style=\"text-align: left\"><span style=\"line-height: 140%;font-size: 28px;color: #f07f1d\"><span><span class=\"ui-provider hc b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Do you have any questions or need support?<\/span><\/span> <\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"100%\" max_width=\"1080px\" module_alignment=\"center\" min_height=\"168.6px\" custom_margin=\"||16px|||\" custom_padding=\"0px|0px|0px|||\" border_color_all=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;border-style: hidden\">\n<tbody>\n<tr>\n<td style=\"width: 17.122%\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-dh_rund.png\" alt=\"\" width=\"157\" height=\"157\" style=\"color: #ffffff;font-size: 20px\" \/><\/td>\n<td style=\"width: 47.8142%\">\n<p><span style=\"color: #ffffff;line-height: 140%;font-size: 20px\">\"We are happy to advice you on your options for having your systems and applications checked by our experienced security analysts.\"<\/span><\/p>\n<p><span style=\"color: #ffffff;font-size: 16px\">Daniel Heyne, Head of Sales - Security Analysis, OSCP, OSCE<br \/><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" url_new_window=\"on\" button_text=\"Contact us\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-fusszeile-kontakt-pentest.jpg\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_padding=\"|||0px||\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" text_orientation=\"center\" global_colors_info=\"{}\"]<\/p>\n<p style=\"text-align: left\"><span style=\"line-height: 140%;font-size: 28px;color: #f07f1d\"><span><span class=\"ui-provider hc b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Do you have any questions or need support?<\/span><\/span><\/span><\/p>\n<h3><\/h3>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-dh_rund.png\" title_text=\"kontakt-dh_rund\" align=\"center\" _builder_version=\"4.21.0\" _module_preset=\"default\" max_width=\"30%\" max_width_tablet=\"30%\" max_width_phone=\"30%\" max_width_last_edited=\"on|tablet\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"100%\" max_width=\"1080px\" module_alignment=\"center\" min_height=\"168.6px\" custom_margin=\"||16px|||\" custom_padding=\"0px|0px|0px|||\" border_color_all=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"]<\/p>\n<p><span style=\"color: #ffffff;line-height: 140%;font-size: 20px\">\"We are happy to advice you on your options for having your systems and applications checked by our experienced security analysts.\"<\/span><\/p>\n<p><span style=\"color: #ffffff;font-size: 16px\">Daniel Heyne, Head of Sales - Security Analysis, OSCP, OSCE<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" url_new_window=\"on\" button_text=\"Contact us\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pentest We Find Vulnerabilities in Your IT Infrastructure and Reduce Your RiskPentest We Find Vulnerabilities in Your IT Infrastructure and Reduce Your RiskProtect Your Company Proactively with Penetration Testing from usd AG In our Pentests, our security analysts assume the role of a malicious hacker and simulate attacks on your IT system landscape. They attempt [&hellip;]<\/p>\n","protected":false},"author":112,"featured_media":40239,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-40183","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/40183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=40183"}],"version-history":[{"count":4,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/40183\/revisions"}],"predecessor-version":[{"id":65112,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/40183\/revisions\/65112"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/40239"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=40183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}