Penetration Testing

Internal and external Penetration Testing.

Identify weak points in your network.

Identifying even hard-to-find vulnerabilities in your systems using common hacking methods and tools in a targeted and secure manner - all this with prior, targeted coordination and explicit authorization - that is, roughly speaking, a penetration test. In contrast to a vulnerability scan, the vulnerabilities identified here are also exploited where possible and, if necessary, combined with each other to obtain a realistic picture of the actual impact. Depending on the size of the target to be tested, the execution can last from a few days to several weeks.

TYPICAL CLIENT CHALLENGES

  • Identification of all possible weak points and the resulting construction of an individually tailored test procedure
  • Identify existing vulnerabilities in apps/systems/codeChoose a fitting pentest type
  • Balancing pentest duration and scope for highest effectiveness
  • Setting up environments for security testing
  • Allocation of internal ressources

OUR APPLIED SOLUTION APPROACH

  • Analysis of company-specific weak points and development of an individual solution in accordance with BSI recommendations
  • Perform well structured/packaged pentests
  • Set up a dedicated lab for Pentesting customer's apps/systems/code

GENERATED VALUE ADD FOR THE CLIENTS

  • Customized testing strategy to identify the maximum possible number of vulnerabilities
  • Saving time, money and especially the allocation of internal ressources on planning, performing and finishing a pentest
  • Get a feeling of a perfectly tailored pentest according to customer's needs/desires which can also be communicated to customers and partners in order to strengthen the corresponding trust
  • No effort to setup dedicated internal testing infrastructure – e2 Security will handle it!

EXEMPLARY DELIVERABLES

  • Perform well-tailored penetration tests for clients of various types and sizes in close collaboration with the customer
  • Lower the complexity of planning and performing penetration tests by providing well-structured information (service catalogue, "pentest project calculator", demo report)
  • In addition, the development and implementation of a social engineering penetration test to identify internal weaknesses

Let's talk.

Do you have any questions?

The experts at e2 Security will be happy to help you.

We are looking forward to your message!

Let's talk.
Share by: