Insight into infrastructure security

Identification of critical and vulnerable systems

Practical advice and suggestions

In brief

During the execution of this security investigation, we map both the internal (on-premise) and cloud (Intune, Azure, Google, etc.) company network. We deploy vulnerability scanners and semi-automated tooling to identify vulnerabilities in the infrastructure and provide pragmatic advice and suggestions on how to protect them. It is recommended to perform the  "Security research corporate network (external)" first.

Working method

Our investigations into internal corporate networks go through these phases:

  • Converstation
    We start with a discussion about the collaboration and test approach.
  • Examination
    We test the security of all machines in your company network, such as servers, workstations, but also printers, VoIP and LAN/WiFi networks. In addition, we check different configurations (firewall, switch) and look for attack scenarios from a malicious perspective. We perform these tests at your location or via a VPN connection.
  • Documentation
    We document our findings and personalized advice in a comprehensive test report.
  • Next steps
    We hand over the report, discuss the main points with you and think along about pragmatic solutions.
  • Aftercare
    We remain available to you for questions, retests and advice.


Every corporate network is different, and complex environments require more analysis than simple setups. A security investigation of the internal company network is therefore always tailor-made.

Of course there is the possibility to limit the scope of the research if you want to manage costs. We are happy to inform you about this.

To get going

Do you want a quick insight into the security level of your office environment?
Then contact us now for a no-obligation introductory meeting.