Security Cycle
Security Hub
Vulnerabilities
Analyze
Pentecost
sting
Darknet research
Additional
exams
IT security
Security Analysis
in circulation
Continuous protective measures that reinforce each other — from the initial vulnerability to ongoing monitoring.
External vulnerability analysis
Automated Scanning, CVE Mapping & Prioritization of Open Vulnerabilities
Level 1
External & Internal Pentesting
Simulated attacks from a hacker's perspective — internal as well as external
Level 2
Darknet research
Leak Monitoring, Stolen Credentials & OSINT Analysis
Level 3
Additional tests
Compliance Audits, Phishing Tests & Individual Security Checks
Level 4
EN
DE