Penetration testing A step ahead of the hackers

Pentest: Security for small and medium enterprises

Every day, hackers leverage new ways and try to gain access to valuable SME data. Just like our IT security experts. The difference being that our experts are deliberately searching for and homing in on the security gaps in IT systems. We use specially designed vulnerability tests for this, penetration tests or pentests for short. Why? To close security gaps in your IT systems, to raise your awareness as the topic owner at your company of vulnerabilities in applications, software and tools and to protect your systems better. Eager to find out more? Then feel free to get in touch.

Making sure your data is safe: The right penetration test for every use case

The dhpg team comprises cyber security, network and certification experts. This means we can guarantee the execution of vulnerability analyses and penetration tests, analyse cyber attacks and secure evidence data after an IT security incident all from one single source.

We offer the following penetration tests to analyse vulnerabilities in IT systems, tools and applications:

  • Internal and external systems
    • Client / server
    • Network components
    • Printers
    • Firewall / router
  • Web applications
    • Internet and Intranet sites
    • Customer/vendor portals
    • Web shops
  • WLAN environments
    • Access points
    • Clients
    • Encryption/security mechanisms

 

We conduct our IT security tests based on the
OSSTMM 3.0 method (Open Source Security Testing Methodology Manual). OSSTMM 3.0 is compatible with current standards such as ISO/IEC27001, IT-Grundschutz, SOX and Basel II and recognised by the Federal Office for Information Security (BSI).

Cyber Security Operations Centre – kicking in where virus protection and firewalls come up against their limits

The most effective way to combat cybercriminals is to organise a group of stakeholders who share the goal of fighting hackers and who benefit from exchanging experiences and protective measures. Join the Cyber Security Operations Centre and you will receive continuous information on current cyber attacks, their mitigation and protection against system failure.

IT services/ Penetration testing

Consulting with personal touch

Your personal contact
Durch das Laden des YouTube Videos erklären Sie sich damit einverstanden, dass Cookies durch YouTube und Google gesetzt werden, und dadurch Daten an diese Anbieter übermittelt werden. Wir verarbeiten die Daten um die Zugriffe auf unsere YouTube-Videos analysieren zu können oder die Wirksamkeit unserer Werbung und Anzeigen auszuwerten. YouTube und Google verarbeiten die Daten auch zu eigenen Zwecken. Zudem erklären Sie sich auch damit einverstanden, dass Ihre Daten in die USA übermittelt werden, obwohl in den USA das Risiko besteht, dass US-Behörden zu Überwachungszwecken Zugriff auf Ihre Daten erhalten und Ihnen dagegen möglicherweise keine ausreichenden Rechtsschutzmöglichkeiten zustehen. Weitere Informationen finden Sie in unserer Datenschutzerklärung.
Permalink