Most network-related risks are already contained through appropriate measures taken in the data centers (firewalls, etc.). The actual vulnerability is often in the application itself where there are a series of likely points of attack that must also be controlled and hardened by the application. We therefore offer to prepare, conduct, and log penetration tests to check if security is up to scratch.
A penetration test focuses on checking the system/application for existing vulnerabilities from the perspective of an independent potential hacker. We offer to conduct penetration tests for:
- Applications (e.g., web, SAP)
- Mobile applications
- Embedded security (Scada, Industry 4.0)
Spectacular hacker attacks, corporate espionage, compliance violations, and data theft are a reality in a connected company. IT systems and applications map increasingly complex business processes and process sensitive data. This steadily increases the risk of companies becoming the focus of criminal activity. We help with correctly assessing the situation and initiating suitable steps to minimize damage and identify perpetrators. Being able to understand misconduct or an attack requires comprehensive knowledge of system processes and the traces left by a user in digital systems, as well as extensive experience with possible attack scenarios and security gaps.DDoS prevention
With a DDoS (Distributed Denial of Service) attack, criminals bring online shops and other websites to a standstill by using many different computers at the same time, e.g., in order to lend weight to threats of blackmail. Firewalls and other defensive measures do not help in such cases. DDoS defense, however, provides effective protection as our security experts ward off attacks in Telekom's IP backbone directly – as soon as possible after an attack has been reported, around the clock, in close consultation with you, and without any volume restrictions. This way your work is only disrupted slightly, if at all.Mobile Protect Pro
Mobile Protect Pro provides real-time protection for corporate data, against attacks on mobile devices, networks, and applications. It's a permanent ECG for mobile devices which also detects unknown attack patterns early on. Hosting in Telekom's highly secure data centers in Germany.