
Penetration Testing
by Attila Bognar from DIESECDescription
A penetration test (pentest for short) or also known as pentesting is a comprehensive security test of individual computers, servers and/or networks of any size as well as web applications.
The tester is able to exploit the security vulnerabilities in the existing system(s) and use appropriate methods to penetrate without authorization.
This type of testing is becoming more and more important in times of increasing digitalization.
With the help of a pentest, the vulnerabilities or security holes are revealed throughout the entire critical IT infrastructure.
We offer three different models of penetration tests that allow you to decide how aggressively you wish to test your processes and systems:
White Box Test
The tester cooperates with the IT team, has full knowledge of the infrastructure, and can test every single aspect.
Grey Box Test
The tester has credentials similar to those of an internal user and some knowledge of the company, which allows them to vigorously test the assets.
Black Box Test
This is the most similar to a real-life attack. The tester has no credentials or prior knowledge of the company.
All of our penetration tests are completed by highly qualified individuals who have obtained
industry-specific certifications, including CEH, OSCP, CISA, OWSA, OSWE and more.
Solution properties
-
Cloud, SaaS, web-basedOn-premise WindowsOn-premise LinuxDesktop MacDesktop WindowsDesktop LinuxMobile AndroidMobile iOS
- Market independent/agnostic (Means the solution overlaps all markets, and is linked to all)
- The vendor did not specify this data field
Summary on Pricing plans
-
Custom pricing
Vendor overview
DIESEC

Contact details
- Founded in 2009
- Ernst-Ludwig-Straße 3 64283 Darmstadt
-
Solution details
-
Freelancer/sole proprietorNon-profitSmall businessMid-size businessLarge enterprisePublic administration
-
English
-
German
-
Portuguese
-
Russian
-
Ukrainian
- ISO/IEC 27001 Information Security Management Systems – Requirements
Support services offered by the vendor ensuring the right implementation and functioning of the solution
Training services offered by the vendor enabling the end-user to use the solution