Within the scope of a "Vulnerability Assessment" we analyze your IT system (e.g. your web store application) or your software-based product (e.g. your IoT product) for weaknesses that could result in an increased IT security risk.
We use professional security analysis tools (e.g. security scanner) that are individually adapted to your system. In advance we clarify with you whether this analysis can be done remotely or whether it has to be done on site (e.g. in your data center).
Depending on the weak points identified and their risk potential, we then submit proposals for effective countermeasures. This enables you to eliminate the weak points before attackers can take advantage of them:
The assessment effort depends on the number and size of the IT systems to be considered in the assessment. We offer you different assessment formats depending on your goals. For example: