Description
The aim of this penetration test is to validate whether your system is resilient to the attack scenarios that can realistically be expected.
Depending on the industry, criticality and scope of your system, we create an individual test plan for you.
After carrying out this test, you will receive a report, which is tailored to your individual requirements.
Optionally, we can also support you in implementing the necessary mitigation measures - from supporting your development team to setting up a resilient architecture with suitable processes.
Procedure
Initial Contact
Please enter your enquiry into our contact form
or reach out to us by mail to mail@jubeco.de
In urgent cases, you can also reach us by phone on +49 221 1704 3078.
Preliminary Discussion
We will work out the following points with you in a preliminary discussion:
- which website or which APIs are to be tested?
- what expectations or requirements do you have of us?
- Are there any industry-specific guidelines or risks that we should take into account?
- What time or budget constraints do you have?
With this information, we will make various suggestions during this first meeting as to which scope might be appropriate for your requirements and resources.
To make your choice easier, we will also give you an estimate of the costs at this stage.
Commissioning
You will receive an offer with a detailed description of the requirements defined in the preliminary discussion.
As soon as we receive an order, we will ask you to name a technical contact with whom we will determine the exact details of the implementation of your pentest.
Final Report
After the pentest is complete, we will provide a detailed report based on your requirements. This report typically includes:
- A management summary
- A general assessment of the test object’s security
- An overview of the steps needed to achieve the required security level
- A technical summary for the developers or system administrators, which contains for each finding:
- An assessment of criticality
- A technical description
- Recommended mitigation measures
Closing Discussion
This is where we present the final report to you and your team and answer your questions. If required by you - and only then - we will present you with further options for employee training and consulting.