In a penetration test of a web application, we search for vulnerabilities and weaknesses manually and with (semi-) automatic tools. The method of the penetration testers is partly comparable to that of a real hacker, although they often also have access to the source code. Certain checks can be automated are therefore suitable for frequent execution. The icing on the cake is active monitoring that allows you to catch hackers at an early stage.

Read more about our penetration tests:
Security Assessment
We thoroughly investigate your custom applications with tests and code reviews.
Read more
One-off Check up
We check your web application for the most common vulnerabilities.
Read more
Vulnerability Scan
We periodically scan your application and hosting for vulnerabilities.
Read more
Detection / Prevention
We install active defense and monitoring for your application.
Read more