Pentest - Penetration test
Find and fix weak points
A pentest provides an opportunity to test your system's resistance to attacks by hackers. The most valuable aspect of a pentest is that it exposes your system to the same stresses in a controlled setting as a real hacking attempt. A pentest helps expose and fix your system's weaknesses.
Types of penetration testing
Penetration testing for web applications
Penetration testing for web applications is about identifying and fixing vulnerabilities in web applications with experienced, certified cybersecurity experts.
Pen test results confirm the threat posed by specific security vulnerabilities or faulty processes and enable IT management and security experts to take remedial action. In this way, we help you avoid data incidents that could jeopardize the company's reputation and reliability.
Penetration testing for web applications is essential for finding vulnerabilities. In addition to external penetration testing, our web application experts can examine application code line by line to identify dangerous vulnerabilities or backdoors.
Penetration testing for mobile apps - iOS and Android
Securing mobile apps is more important than ever. We help you find and fix vulnerabilities in iOS apps. The attack surface of an iOS app consists of all components of the app, including libraries used, as well as processes required to release the app and support its functionality.
In mobile pentesting, we perform a test of your mobile applications (iOS / Android), the backend application environment, and the communication between the device and the backend application environment. We identify the vulnerabilities in data storage, authentication or your communication channels. Likewise, we look for security vulnerabilities in the application logic (e.g. authorization) and validate the code used.
Desktop Application Pentest
A security assessment of your Windows, macOS, or UNIX application ensures that it has been set up securely and contains no vulnerabilities that could compromise the security of the application or the data it processes.
IoT Device Pentest
The Internet of Things (IoT) is growing rapidly, and organizations around the world are beginning to realize the benefits these devices can bring to their operations and employees/customers. The security of such devices is critical, especially if they process sensitive data and/or they have access to critical networks/systems within an organization.
The General Data Protection Regulation (GDPR) is an EU regulation on data protection and privacy for every individual in the European Union. Failure to comply with the GDPR can ultimately result in a fine of €20 million or 4% of annual gross turnover.
Procedure and duration of a penetration test
Our selection of services outlines what will be done during our audit. In order to determine the scope of the audit, we will send you a short questionnaire in advance. If you have any problems answering the questionnaire, we will be glad to assist you. After the audit is completed, we will send you a detailed report on the tests and attacks performed, the vulnerabilities discovered, and the actions recommended to resolve them. If you do not have the resources to fix the vulnerabilities found, we will be happy to assist you.
Cost of a penetration test
A network security test usually takes 4 to 9 man days. The costs start at CHF 6'000. A precise quote with scope of services and exact costs can be provided by us after we could clarify some parameters with your IT consultant. For small businesses with up to 5 employees we offer a SME-network-security-test, which we can offer for CHF 4'500.Get a quote for pentesting