Our work ethic
During the pentest we will look at the progress together. We can even temporarily stop a pentest so that you can solve issues and/or vulnerabilities. This will help avoid a second pentest afterwards. This way there are no surprises afterwards.
Phase 1: Assessment
Phase 2: Pentest
Phase 3: Reporting
Pentest5 - 7 days
- Assessment meeting
- Automated web application and network scans
- Extensive manual test
- Execution remote, on site if necessary
- Intermediate rescan(s) for found vulnerabilities
- Report with findings and recommendations
- 12 monthly security scans afterwards
Curious about our services?
Are you interested in our pentests or any of our other services? Fill out your details and we will contact you within 24 hours on business days.