Penetration testing A step ahead of the hackers

Pentest: Security for small and medium enterprises

Every day, hackers leverage new ways and try to gain access to valuable SME data. Just like our IT security experts. The difference being that our experts are deliberately searching for and homing in on the security gaps in IT systems. We use specially designed vulnerability tests for this, penetration tests or pentests for short. Why? To close security gaps in your IT systems, to raise your awareness as the topic owner at your company of vulnerabilities in applications, software and tools and to protect your systems better. Eager to find out more? Then feel free to get in touch.

Making sure your data is safe: The right penetration test for every use case

The dhpg team comprises cyber security, network and certification experts. This means we can guarantee the execution of vulnerability analyses and penetration tests, analyse cyber attacks and secure evidence data after an IT security incident all from one single source.

We offer the following penetration tests to analyse vulnerabilities in IT systems, tools and applications:

  • Internal and external systems
    • Client / server
    • Network components
    • Printers
    • Firewall / router
  • Web applications
    • Internet and Intranet sites
    • Customer/vendor portals
    • Web shops
  • WLAN environments
    • Access points
    • Clients
    • Encryption/security mechanisms

 

We conduct our IT security tests based on the
OSSTMM 3.0 method (Open Source Security Testing Methodology Manual). OSSTMM 3.0 is compatible with current standards such as ISO/IEC27001, IT-Grundschutz, SOX and Basel II and recognised by the Federal Office for Information Security (BSI).

Cyber Security Operations Centre – kicking in where virus protection and firewalls come up against their limits

The most effective way to combat cybercriminals is to organise a group of stakeholders who share the goal of fighting hackers and who benefit from exchanging experiences and protective measures. Join the Cyber Security Operations Centre and you will receive continuous information on current cyber attacks, their mitigation and protection against system failure.

IT services/ Penetration testing

Consulting with personal touch

Your personal contact
By uploading the YouTube video, you consent to cookies being set by YouTube and Google and to data being transferred to these providers. We process the data in order to be able to analyse access to our YouTube videos or to evaluate the effectiveness of our advertising and ads. YouTube and Google also process the data for their own purposes. In addition, you also agree that your data may be transferred to the USA, although there is a risk in the USA that the US authorities may gain access to your data for surveillance purposes and that you may not have adequate legal protection against such. You will find further information in our Data Protection Policy.
Load YouTube Video
Permalink