Pentest – What analysis approaches are there?

14. February 2020

Attackers gaining unauthorized access to IT systems and applications has severe consequences for companies. Pentests identify possible gateways hackers could exploit and show ways to sustainably raise the IT security level of a company. This makes pentesting one of the most effective methods of security analyses companies can employ to proactively protect themselves against hacking attacks. The security analyst (pentester) tries to penetrate the IT infrastructure of a company with the same methods and means available to a potential attacker.

Read more about the different pentest approaches on the usd website.

Also interesting:

Security Advisory 07/2021

The usd HeroLab pentesters identified vulnerabilities in products from ManageEngine and Red Hat while conducting their security analyses. In close cooperation with the...

read more

Security Advisory 06/2021

The usd HeroLab pentesters identified vulnerabilities in products from Microsoft and RabbitMQ while conducting their security analyses. In close cooperation with the...

read more

Security Advisory 05/2021

The usd HeroLab pentesters identified vulnerabilities in products from VMWare and Bitdefender while conducting their security analyses. In close cooperation with the...

read more