Do you know your IT risks?

Our audits reveal the risks in your IT or web applications, and you will find out which measures will reduce your risk profile.

Audit - We analyze your security
Each audit is individually adapted to the client’s situation, depending on the data to be protected as well as the scope and content of the audit.
Assessment – Gain an overview
The assessment is the highest, least intensive level of an IT security audit. The assessment focuses on determining the current situation and reviewing the security-relevant IT components of a company.
Penetration Test – Attack is the best defense
In this form of the audit, no internal information on the IT infrastructure is available, i.e. the auditor is in the role of an anonymous attacker (hacker) in order to simulate the most realistic attack possible.
Social Engineering – Professional Phishing Prevention
Phishing campaigns are used as part of an extensive audit project or as part of a security awareness project.
Vulnerability Scan
The vulnerability scan provides continuous information about vulnerabilities in the infrastructure and thus provides for a permanent risk assessment.
APT Assessment
This form of investigation provides information on whether the client’s infrastructure is affected by an Advanced Persistent Threat (APT).