Services

We offer different services with different objectives. While Vulnerability Assessment modules such as the Basic Cyber Security Health Check and the Active Directory Security Improvement test in breadth, with the goal of discovering as many existing risks as possible and reducing the attack surface, a Penetration Test goes further in depth to verify possible attack paths, up to Red Teaming which puts the main focus on the depth of the test and simulates realistic threats. The transitions can be fluid and we look forward to hearing from you regarding modules and other cyber security topics.

 

Cyber Security Triangle

 

  • Holistic Information Security Transformation

     

    HIST

     

    HIST stands for Holistic Information Security Transformation. HIST offers your organization the opportunity to efficiently transform its cybersecurity from a weakness to a strength. Thanks to the subscription model, improving your security becomes a process that can be scaled flexibly and starts where real danger threatens. Because our career so far has shown: the major security gaps do not show up when a small, specially prepared part of an environment is tested, because it does not reflect reality. The major security gaps show up when we - like an attacker - are allowed to look around, see contexts and processes, and pick the most interesting targets. By allowing us to use our expertise in selecting targets, nothing irrelevant is tested. Thus, resources are saved.
    To not only find vulnerabilities, but also provide active protection, HIST is also based on Endpoint Detection & Response (EDR) from our partner CrowdStrike. After the initial purchase, this software protects your endpoints and reports suspicious activities. It also allows you to isolate and investigate them in case of an emergency. The best part is that you don't need people to monitor these reports yourself. We do it for you.
    In addition, with us, you also get our knowledge and network involved. For cybersecurity to work in a company, employees need to be trained and made aware. Be it in awareness training or internal training seminars, we pass on our knowledge and make it a point to do this in an understandable way and with lots of demos. If there are areas that we cannot cover on our own, we use our connections to other experts so that these areas are also protected.

    HIST is very flexible and we are convinced that we can offer added value to any company. If you are also interested in HIST, we would be happy to hear from you.

    HIST includes:

    • EDR-as-a-Service
    • First Response
    • Vulnerability Management
    • Attack Path Management
    • Awareness Campaigns
    • Knowledge Transfer
    • Penetration Testing
    • Red Teaming
    • Cloud Security
    • Business Continuity Management
    • Dark Web Monitoring
    • And many more

    HIST Services

  • Basic Cyber Security Health Check

    This module is intended for companies that are still at the beginning of the cyber security process and would like to obtain as comprehensive an overview as possible of the current cyber security situation in the company. In just a few person days, we test large areas in order to identify existing risks and to be able to estimate the core security return on investment (CSROI) for future investments in the cyber security area. Our attacker knowledge is used in a targeted manner to prioritize future measures and maximize the CSROI. 

     

    Basic Cyber Security Health Check

  • Active Directory Security Improvement

    In this module, the heart of internal IT, the Active Directory, is checked for existing risks. Security-related misconfigurations in the Active Directory are mainly exploited by attackers and ransomware and lead to the complete takeover of the infrastructure and end in total IT damage.  With relatively little effort, these misconfigurations can be detected and measures recommended. Here, too, great value is placed on prioritizing the measures.

     

    Active Directory Security Improvement

  • Penetration Test

    In a penetration test, a cyber attack is performed on a system, network or application to discover potential risks and make them measurable. The goal is to validate possible attack paths and reduce the overall attack surface by discovering the existing risks. Efficiency is the main focus and in particular the Blue Team and its reaction to the attack is not tested. Each penetration test is individually planned and adapted to the needs with a view to the big picture. For web applications, the OWASP® Application Security Verification Standard (ASVS) is often used and for mobile apps the OWASP® Mobile Application Security Verification Standard (MASVS).

     

    Penetration Test

  • Cloud Security Check

    Thanks to the shared responsibility model, at least part of the responsibility can be transferred to the provider. However, according to the motto trust is good, control is better, the existing attack surface should also be regularly checked here and it should be prevented that no one sees themselves responsible in the end. In the case of hybrid solutions, for example when integrating an on-premise Active Directory with an Azure AD, new opportunities can arise for attackers, which can assume devastating proportions. Additionally, it is often easier for attackers to use stolen or leaked credentials and access to resources should be kept as restrictive as possible and audited regularly. We know the current threats and help you to keep the attack surface as small as possible despite the dynamics in this area.

     

    Cloud Security Check

  • Container Security Check

    Due to their flexibility, containers are used in almost all stages of software development, be it development, testing or deployment. Ideally, great importance is already attached to cyber security in the CI/CD pipeline and it is considered a fixed component of the requirements and tests. Due to automation and flexibility, small mistakes can have a big impact and a regular review of security aspects is highly recommended. The least privilege principle should be rigorously enforced, as too many authorizations can lead to fatal damage in an emergency. These are exactly the points we look at together with you and are happy to provide the appreciated flexibility also with regard to cyber security.

     

    Container Security Check

  • Red Teaming

    Red Teaming describes the process of simulating real threats and their Tactics, Techniques and Procedures (TTP). The goal is to train and measure the people, processes and technologies to defend the environment. The basis for this is a realistic threat, which can be defined, for example, using the MITRE ATT&CK® framework. A special focus is always placed on the realism and the knowledge to be gained from Red Teaming. The operations are planned and executed individually accordingly. Red Teaming is measured by the factors of training and measurability for the Blue Team. Processing and sharing the lessons learned with the Blue Team after the operation is a key component of a Red Teaming. Here, too, the use of ATT&CK has proven its worth and is readily employed. More about Red Teaming

     

    Red Teaming

  • Cyber Attack Bounty

    For most companies, the primary concern is to protect themselves from financially motivated cyber attacks (for example ransomware). However, they often lack the resources to conduct in-depth penetration tests or red teaming. Nowadays, only covering the external attack surface is no longer sufficient to protect against current cyber threats. With this service, you authorize our red team specialists to attack your company under real conditions. We use the same tools and methods as real attackers and your company will be put to a real test. As in real cyber attacks, your company will not only be attacked once, but will be permanently searched for attack paths. Payment is only made after successful attacks, i.e. after reaching predefined targets, such as initial compromise, access to sensitive data or domain dominance. With our report, exactly these attack paths can be mitigated. If there is no successful attack, nothing is paid, quite simply. This is probably the most realistic and efficient way to increase the cyber security of a company.

     

    Cyber Attack Bounty

We offer different services with different objectives. While Vulnerability Assessment modules such as the Basic Cyber Security Health Check and the Active Directory Security Improvement test in breadth, with the goal of discovering as many existing risks as possible and reducing the attack surface, a Penetration Test goes further in depth to verify possible attack paths, up to Red Teaming which puts the main focus on the depth of the test and simulates realistic threats. The transitions can be fluid and we look forward to hearing from you regarding modules and other cyber security topics.

 

Cyber Security Triangle

 

  • Holistic Information Security Transformation

     

    HIST

     

    HIST stands for Holistic Information Security Transformation. HIST offers your organization the opportunity to efficiently transform its cybersecurity from a weakness to a strength. Thanks to the subscription model, improving your security becomes a process that can be scaled flexibly and starts where real danger threatens. Because our career so far has shown: the major security gaps do not show up when a small, specially prepared part of an environment is tested, because it does not reflect reality. The major security gaps show up when we - like an attacker - are allowed to look around, see contexts and processes, and pick the most interesting targets. By allowing us to use our expertise in selecting targets, nothing irrelevant is tested. Thus, resources are saved.
    To not only find vulnerabilities, but also provide active protection, HIST is also based on Endpoint Detection & Response (EDR) from our partner CrowdStrike. After the initial purchase, this software protects your endpoints and reports suspicious activities. It also allows you to isolate and investigate them in case of an emergency. The best part is that you don't need people to monitor these reports yourself. We do it for you.
    In addition, with us, you also get our knowledge and network involved. For cybersecurity to work in a company, employees need to be trained and made aware. Be it in awareness training or internal training seminars, we pass on our knowledge and make it a point to do this in an understandable way and with lots of demos. If there are areas that we cannot cover on our own, we use our connections to other experts so that these areas are also protected.

    HIST is very flexible and we are convinced that we can offer added value to any company. If you are also interested in HIST, we would be happy to hear from you.

    HIST includes:

    • EDR-as-a-Service
    • First Response
    • Vulnerability Management
    • Attack Path Management
    • Awareness Campaigns
    • Knowledge Transfer
    • Penetration Testing
    • Red Teaming
    • Cloud Security
    • Business Continuity Management
    • Dark Web Monitoring
    • And many more

    HIST Services

  • Basic Cyber Security Health Check

    This module is intended for companies that are still at the beginning of the cyber security process and would like to obtain as comprehensive an overview as possible of the current cyber security situation in the company. In just a few person days, we test large areas in order to identify existing risks and to be able to estimate the core security return on investment (CSROI) for future investments in the cyber security area. Our attacker knowledge is used in a targeted manner to prioritize future measures and maximize the CSROI. 

     

    Basic Cyber Security Health Check

  • Active Directory Security Improvement

    In this module, the heart of internal IT, the Active Directory, is checked for existing risks. Security-related misconfigurations in the Active Directory are mainly exploited by attackers and ransomware and lead to the complete takeover of the infrastructure and end in total IT damage.  With relatively little effort, these misconfigurations can be detected and measures recommended. Here, too, great value is placed on prioritizing the measures.

     

    Active Directory Security Improvement

  • Penetration Test

    In a penetration test, a cyber attack is performed on a system, network or application to discover potential risks and make them measurable. The goal is to validate possible attack paths and reduce the overall attack surface by discovering the existing risks. Efficiency is the main focus and in particular the Blue Team and its reaction to the attack is not tested. Each penetration test is individually planned and adapted to the needs with a view to the big picture. For web applications, the OWASP® Application Security Verification Standard (ASVS) is often used and for mobile apps the OWASP® Mobile Application Security Verification Standard (MASVS).

     

    Penetration Test

  • Cloud Security Check

    Thanks to the shared responsibility model, at least part of the responsibility can be transferred to the provider. However, according to the motto trust is good, control is better, the existing attack surface should also be regularly checked here and it should be prevented that no one sees themselves responsible in the end. In the case of hybrid solutions, for example when integrating an on-premise Active Directory with an Azure AD, new opportunities can arise for attackers, which can assume devastating proportions. Additionally, it is often easier for attackers to use stolen or leaked credentials and access to resources should be kept as restrictive as possible and audited regularly. We know the current threats and help you to keep the attack surface as small as possible despite the dynamics in this area.

     

    Cloud Security Check

  • Container Security Check

    Due to their flexibility, containers are used in almost all stages of software development, be it development, testing or deployment. Ideally, great importance is already attached to cyber security in the CI/CD pipeline and it is considered a fixed component of the requirements and tests. Due to automation and flexibility, small mistakes can have a big impact and a regular review of security aspects is highly recommended. The least privilege principle should be rigorously enforced, as too many authorizations can lead to fatal damage in an emergency. These are exactly the points we look at together with you and are happy to provide the appreciated flexibility also with regard to cyber security.

     

    Container Security Check

  • Red Teaming

    Red Teaming describes the process of simulating real threats and their Tactics, Techniques and Procedures (TTP). The goal is to train and measure the people, processes and technologies to defend the environment. The basis for this is a realistic threat, which can be defined, for example, using the MITRE ATT&CK® framework. A special focus is always placed on the realism and the knowledge to be gained from Red Teaming. The operations are planned and executed individually accordingly. Red Teaming is measured by the factors of training and measurability for the Blue Team. Processing and sharing the lessons learned with the Blue Team after the operation is a key component of a Red Teaming. Here, too, the use of ATT&CK has proven its worth and is readily employed. More about Red Teaming

     

     

    Red Teaming

  • Cyber Attack Bounty

    For most companies, the primary concern is to protect themselves from financially motivated cyber attacks (for example ransomware). However, they often lack the resources to conduct in-depth penetration tests or red teaming. Nowadays, only covering the external attack surface is no longer sufficient to protect against current cyber threats. With this service, you authorize our red team specialists to attack your company under real conditions. We use the same tools and methods as real attackers and your company will be put to a real test. As in real cyber attacks, your company will not only be attacked once, but will be permanently searched for attack paths. Payment is only made after successful attacks, i.e. after reaching predefined targets, such as initial compromise, access to sensitive data or domain dominance. With our report, exactly these attack paths can be mitigated. If there is no successful attack, nothing is paid, quite simply. This is probably the most realistic and efficient way to increase the cyber security of a company.

     

    Cyber Attack Bounty