Do you examine your structures?!

Do not rely blindly on your „perfectly“ configured systems!

                                            We give you an overview of your actual security level ...

Our aim

  • Identification of weak points
  • Enhancement of your security
  • Confirmation of the ICT
  • Catalogue of measures
  • Overview of the Security Level
  • Improvement of awareness
  • Know-How Transfer
  • Sensitisation of employees
  • Testing of escalation scenarios
  • Introduction of security guidelines
  • etc.

Our methods

Pentest

The penetration test is a simulated, realistic hacker attack. A considerably bigger part of the works is executed manually and we put ourselves in the role of a hacker. In this case our security-experts use the latest methods and tricks which are also applied by hackers and crackers.

Black-Box Analysis

The goal of a Black-Box Analysis is the examination of the security architectures and infrastructures from the internet, the detection of weak points basing on technical or organisational issues as well as the determination of measures for the elimination of weak points or rather the reduction of potentially harmful impacts on the internet.

Dumpster Diving

The Dumpster Diving is an additional method to obtain information of your company.
If someone gets access to discarded documents, memos, organisation plans, CDs, backups etc. he can easily reconstruct from these documents what role someone fulfills in the company.
Such an activity can already be a preparatory measure for an espionage or a hacker’s attack.

Social Engineering

Social Engineering is a highly efficient method to obtain company information without the use of technical tools.
The hacker uses a stepwise procedure. In telephone calls or via emails with different company employees he, in the first step, elicits information, especially relating to positions of responsibility, and information concerning organisational structure. In the second step to prepare his attack he uses this information as a means of confidence building.

Wireless Analysis

Wireless LANs offer a lot of practical advantages and help companies to save costs. At the same time wireless networks open a number of security gaps which make a company vulnerable to attacks coming from inside and outside.

White-Box Analysis

The goal of a White-Box Analysis is the examination of security architectures and infrastructures in the local area network, the detection of weak points basing on technical or organisational issues as well as the determination of measures for the elimination of weak points or rather the reduction of potentially harmful impacts in the local area network.