This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

Use #itsa19

6 - 8 October 2020 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2019
Zoom product LOGO_Penetration Test

Penetration Test

LOGO_Penetration Test

Penetration Test

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Over and over again we read in the news of hacker attacks on enterprises. Customer data is stolen and entire networks are taken hostage. Even the largest companies are not safe from internal and external attacks.

 
Deceiving security
According to a Accenture Study from 2016, there is a big gap between the confidence of the own cyber security strategy and the actual danger for enterprises. The consultation of 2000 security officers from large companies found that one in three targeted attacks led to a security breach. With about 100 attacks per year, this makes two successful attacks per week.

Only two out of three security breaches were detected by the internal security team. In addition, more than half of them took several months to be discovered.

 
Successful cyber security
In order to defend companies more efficiently against attacks, it is no longer sufficient to rely on well-tried measures and methods. Just as attackers are constantly improving and seek new ways of attacking, cyber security needs to evolve. The development of new defence strategies and staff training is strengthening the arsenal of cyber security.

But the best defence strategies are useless if, in an emergency, no one knows exactly how they work and whether the methods developed are effective. For this purpose it is advisable to put them to the test from time to time.

 
Penetration Test
During a penetration test, we check the current status of your IT security and provide you with valuable information for improvement. The type of test depends on your requirements. We distinguish between network penetration tests from outside and inside your company, web application penetration tests, mobile app penetration tests and wireless penetration tests. More details on the individual types can be found in our white paper.

 
Penetration Tests procedure:

  • Definition of the type and the scope in cooperation with the client
  • Vulnerability scan of the system
  • Analysis of vulnerabilities for exploitation
  • Weighting and evaluation of vulnerabilities
  • Creation of a final report
  • Presentation of the final report

Penetration Test is assigned to following product groups:

You decided to attend the it-sa? Get your tickets at the TicketShop



top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.