IT Security Certificates - Proof of Security for Your Systems
Use our comprehensive security certificate to demonstrate the high level of security of your web applications, mobile apps, and infrastructures to customers and users. A successful accreditation is preceded by a cloud assessment or penetration test.
Definition and Explanation
Cloud or Pen-Test Security Certificate as a Competitive Advantage!
The certificates we issue demonstrate a high level of security at a given point in time. Depending on the assessment, different test guidelines, standards, or test modules are selected and evaluated. The evaluation is based, among other things, on the practical guidelines for pentests of the Federal Office for Information Security (BSI) and the EU GDPR.
With our certificate, our customers can also demonstrate online that the developed security measures are effective and that security regulations are being complied with. The company's image can also be positively highlighted, as it is suggested that IT security, data security, secure data centers, and data protection form an important basis.
Our certificate is only issued if a good cloud assessment or pentest result has been achieved or the free retest confirms the required maturity level.
Certificates for Penetration Testing, Cloud Security Assessments and selected services
Interfaces as well as Front- and Backend
Web and API Applications
We test and certify web and API applications according to the OWASP Web Security Testing Guide. Below you will find the individual sub-tests:
- Information Procurement
- Configuration Management
- Session Management
- Error Handling
- Identity Management
- Authentication
- Authorizations
- Input Validation
- Cryptography
- Business Logic
iOS and Android Pentesting
Mobile Apps
We test and certify mobile applications (apps) according to the OWASP Mobile Security Testing Guide. Below you will find the individual sub-tests:
- Architecture, Design and Threat Analysis
- Data Storage and Data Protection
- Session Management
- Cryptography
- Network Communication
- Platform Interaction
- Business Logic
- Code Quality and Build Settings
- Manipulation Security
Servers, IoT, WLAN and Firewalls
Infrastructures
We test and certify infrastructures according to the Penetration Testing Execution Standard. Below you will find the individual sub-tests:
- Information Collection
- Firewall Analysis
- Patch Management
- VPN Analysis
- Privilege Escalation
- Network Manipulation
- Active Directory (AD)
- IoT Devices (Internet of Things)
- Public Key Infrastructures
Cloud Cyber Security
Cloud Assessment
Cloud Security Assessments are conducted and evaluated by our specially trained Security Engineers according to recognized standards of information security planning.
- AWS
- Microsoft Azure
- GCP
- Digital Ocean
- Open Telekom Cloud
Contact
Curious? Convinced? Interested?
Schedule a no-obligation initial consultation with one of our sales representatives. Use the following link to select an appointment:
