Security Assessment

During a security assessment (also known as a penetration test / pen test), we thoroughly examine your application and production environment.

We help your team find vulnerabilities and come up with practical solutions. We are specialized and certified in fully screening software from every conceivable angle.

Working method

Our web application assessments go through these phases:

Converstation
We start with a discussion about the collaboration and test approach.

Examination
We get to know your web applications well and examine all functionality and links. With your consent, we also dive deep into the code to get the most complete picture possible.

Assessment
A certified employee conducts the security screening according to the guidelines of OWASP with several test methods. This assessment is mostly "manual work" whereby we test your applications interactively via an attack proxy.

Documentation
We document our findings and personalized advice with code examples in a detailed test report.


Handover
We hand over the report, discuss the main points with you and think along about pragmatic solutions.

Aftercare
We remain available to you for questions, retests and advice.

Ethical hackers testen een webapplicatie voor cyber security kwetsbaarheden.

Investment

Complex applications with, for example, many connections require more analysis than simple applications. Therefore, a security investigation for a web application, including the server, is always tailor-made.

Of course, you can limit the scope of the investigation to control costs. We would be happy to provide you with more information.

Getting started

Do you want permanent assurance about the secure setup of your servers or sites? Contact us now for a non-committal introductory meeting.

Contact us