What is ethical hacking?
In short, Ethical hacking is nothing more than a simulation of a real hacking attack. After careful planning and negotiation with the customer, we attack a commonly defined scope of the infrastructure or application in order to reveal possible weaknesses and vulnerable points that could present easy targets to actual unwanted attacks.
Why do you need a test?
Consider the possibility of one or more of the following:
- a competitor gaining access to the company database
- protected information becoming publicly available
- a third party gaining access to corporate e-mail
- an outsider logging in on the company’s internal network
- the company website being re-structured or falsified
What you'll be getting
Our primary objective lies not in finding one soft spot to penetrate through and compromise the system, but to uncover each and every brick that came loose to weaken the whole structure, to document these findings and make recommendations on how to eliminate them most effectively.
To whom we recommend it
Running vulnerability assessments on a regular basis should be a fundamental task for any organization that has an IT infrastructure of its own, as it provides essential information for risk management and proactively helps mitigate upcoming attacks. We strongly recommend an assessment to be performed at least once a year.
You store client data. Is your website safe?
A browser is a hacker's killer weapon. We check Webstores, services, ERP & CRM systems; almost everywhere where login is required.
How far a hacker can go from the internet?
Your whole company infrastructure can be in danger if it's online. We check if your front-end defense is safe enough.
Simulate LAN and WiFi attacks on your system
Vulnerability tests on your local network, with a common desktop, from your meeting room or via WiFi cracking.