Services

Security Health Check
The service for companies that want to take the first step into cyber security. Broad, automated and cost-saving.

Penetration Testing
Whether entire networks or individual systems, in-house developed web applications or purchased software, a penetration test uncovers potential risks and vulnerabilities.

Red Teaming
How will your Blue Team respond to a realistic attack? This service is for organizations that want to further improve their high cyber resilience through MITRE ATT&CK-based scenarios.

AD Security Improvement
The IT core of your company (Active Directory) is checked for common misconfigurations. Ransomware, which usually exploits such vulnerabilities, is thus warded off.

Attack Simulation
Realistic attack simulations can be run in smaller, individual modules for greater efficiency or as a whole with the Bug Bounty payment model.

System Audit
Would you like to have individual systems checked in detail, including their configuration? This service is particularly recommended for VDIs, new clients, PAWs or firewalls.

Phishing
By means of one or more waves, the awareness of your employees is tested for a phishing attack that is often used as the first entrypoint.

Password Audit
How secure are passwords in your organization? Many attacks target weak passwords or their insecure storage.

Custom
Contact us for a specific, technical cyber security audit tailored to your requirements.