10 - 12 October 2017 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Zoom product LOGO_Penetration Testing

Penetration Testing

LOGO_Penetration Testing

Penetration Testing

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

The objective of a penetration test is the assessment of preferably all systems and applications and services running within a predetermined scope, for example the computer network of a company.

While trying to compromise these systems (coll. “to hack”), the security expert leverages all those tools and methods that a real attacker would use to gain unauthorized access and cause damage.

In contrast to automated-only vulnerability scans, a proper penetration test requires - besides manual execution - a decent amount of preparation to define goals and requires post-processing of the results to effectively close the discovered vulnerabilities.

Especially the latter often requires not only a purely technical improvement, but also an organizational rethinking that counteracts and prevents future security holes.

Even then, a penetration test has to be understood as a snapshot rather than a permanent seal of approval due to the fact that even small changes in tested components or a newly discovered vulnerability (“zero day”) can render a system vulnerable again.

The renowned cryptography expert Bruce Schneier defined the basic principle for understanding modern security as: “ … a process, not a product.”

Reverse Engineering von Binärprogrammen, Verfahren und Geräten

LOGO_Reverse Engineering von Binärprogrammen, Verfahren und Geräten

Guidelines and Policies

LOGO_ Secure Coding Guidelines und Policys, sonstige Leitlinien und Standards

Source Code Analysis

LOGO_Toolgestützte Source Code Analysen, statisch und dynamisch

Web Application Firewalls

LOGO_Web Application Firewalls, Web Shields oder Application Level Gateways

There are no entries in your notes.

Show notes


The selected entry has been placed in your notes!

If you register you can save your notes permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your notes permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your notes mobile too! Simply log in and access them at anytime.