Your Requirement

You would like to check your network-attached equipment for vulnerabilities open to the internet and resolve these issues, to protect your network from hackers attacks and other security risks.

Our Offer

With the aid of vulnerability scanners and in close cooperation with your staff we will scan for security vulnerabilities of your equipment and document them. On request we will work together with you on improvement of your system’s IT security.

Preconditions

As the testing methods – under rare circumstances – could have an impact on IT systems of your institute, the scans must be conducted in close consultation with your institute and be approved of by its directors.

Manuals and further information