Pen testing

Our security experts check the security of your IT systems with a penetration test

We hack your infrastructure – to help protect you!

A Pallas security expert checks the security of your IT systems with a penetration test.

The security expert (‘ethical hacker’) from Pallas poses as an attacker in order to uncover ways of accessing an IT system without authorisation. Pen tests are performed by Pallas experts in agreement with the customer.

Contact

*Mandatory field
*Mandatory field

Benefits

Take advantage of our expertise!

With our many years’ experience in IT security system operation and consultancy, we know what it’s all about.

Get security!

For the pen test, our security expert (‘ethical hacker’) poses as an attacker in order to uncover ways of accessing an IT system without authorisation. So you know which security loopholes you need to close.

Professional tools

Tools that mimic classic attacks or detect vulnerabilities are a key component of pen tests. Automatic scanners such as the Pallas PASA scanner are also used.

Hacking to help our clients

A Pallas security expert (‘ethical hacker’) poses as an attacker in order to uncover ways of accessing an IT system without authorisation.

A penetration test is a simulated attack aimed at testing the security of applications, networks and infrastructure. IT experts use the techniques of potential attackers to achieve this. This helps establish whether the security measures implemented actually function. In a compliance context, these tests are classed as ‘monitoring efficiency’.

startseite icon detection

The pen test procedure: Based on the procedure recommended by the German Federal Office for Information Security (BSI), the following steps are usually taken:

  • Set targets and general preparation
  • Assess and acquire information on the tested system
  • Active penetration attempts
  • Evaluation of result and report with recommendations

Tools: Tools that mimic classic attacks or detect vulnerabilities are a key component of pen tests. Automatic scanners such as the Pallas PASA scanner are also used.

We also provide

The following services might also be of interest to you

IT security audit

Web application security test

Kontakt

*Pflichtfeld

Contact

*Mandatory field