10 - 12 October 2017 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2017
Zoom product LOGO_Penetration tests

Penetration tests

LOGO_Penetration tests

Penetration tests

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Send
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

Penetration tests can be highly customized to meet the individual needs and requirements of clients. Depending on the respective type of penetration test, for example, the external network access points may be analyzed for security vulnerabilities, including the various web applications. Mobile end devices, data storage media and authentication tokens can also be included, as part of the “lost devices” scenario.

During the performance of penetration tests, our IT security experts follow procedural models from recognized institutions, such as the German Federal Office for Information Security (BSI). To this end, they use a specially developed test platform, the “Distributed Penetration Platform” (DPP). This allows centralized data storage for penetration tests in complex network environments, for example, as well as the performance of parallel tests to increase efficiency.

TÜViT ist certified by the German Federal Office for Information Security (BSI) as an IT security service provider for penetration testing.

Your benefits at a glance:

  • identification of specific vulnerabilities (technical, organizational, procedural)
  • objective assessment and evaluation of the effectiveness of your IT security measures
  • specific recommendations for security measures, in order to eliminate the security vulnerabilities (technical, organizational, procedural)
  • increasing the security of critical data, systems and applications
  • increasing the efficiency of the mix of technical, organizational and procedural measures
  • preparation for an internal or external acceptance procedure, audit or certification
  • increasing the security awareness of employees at all hierarchy levels
  • verification of the security level by means of a corresponding certificate/seal of quality as verification of trusted status toward supervisory institutions and clients

More information at: https://www.tuvit.de/en/services/cyber-security/penetration-tests/

Data Center Security

LOGO_Data Center Security

Common Criteria Evaluations

LOGO_Common Criteria Evaluations

EU-Datenschutz-Grundverordnung (DSGVO)

LOGO_EU-Datenschutz-Grundverordnung (DSGVO)

ISO 27001

LOGO_ISO 27001
top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.