Security Testing – Overview of Services

Security Testing –
Our Services
Our security experts assess your applications and systems, leveraging experience gained from thousands of analyses.
Application Security Testing
Static Code Analysis
Find vulnerabilities where they originate: With Static Code Analysis (SAST), we uncover security problems directly in the source code – even during …
Application Security Penetration Tests
Penetration tests are the easiest way to check the security of applications and systems.
Fat Client Security Testing
With our specialized security testing approach, we reliably uncover vulnerabilities in fat client applications.
LLM Security Testing
Classic penetration tests quickly reach their limits with AI-based applications. Our approach is tailored to the pitfalls of LLM-based applications.
OWASP ASVS Assessment
With an OWASP ASVS Assessment, you receive a comprehensive, standardized review of your software – tailored to protection needs and compliance requirements.
Docker Security
The lightweight nature and flexibility of containers also harbor risks. We comprehensively test your container infrastructure – from the image to the registry …
Cyber Security Testing
Our lightweight approach to comprehensive protection
The first step towards solidly securing your own company against cyber attacks does not have to be complex and expensive. Our efficient approach ...
M365 Security Testing – The Right Approach for Your Company
Secure your M365 environment in the long term with our pentest and analysis approaches.
Red Teaming Assessment
Uncover vulnerabilities in technology, processes, and the human factor, and put your security team's responsiveness to the test.
Open Source Intelligence / OSINT
An OSINT scan provides you with the basis for a realistic assessment of your public attack surface – from the perspective of a potential attacker.
Infrastructure Security Testing
Infrastructure penetration tests
Infrastructure penetration tests check your network and system landscape for real attack vectors — from publicly accessible services to internal network segments and identity services.
Internet of Things (IoT) Assessment
Assessment of the security of IoT environments with our assessment, which includes all levels.
Host Audit / Server Hardening
A targeted host audit identifies vulnerabilities in system components that cannot be covered by penetration tests.
