THE WAY WE WORKTHE BRIGHTEST MINDS UNITED IN ONE TEAM.
International standards and many years of experience form the basis of our process model, which guarantees efficiency and quality. NIST SP800-115 specifications, PCI DSS requirements and recommendations of the German Federal Office for Information Security (BSI), the Open Web Application Security Project (OWASP) and the Open Source Security Testing Methodology Manual (OSSTMM) are taken into account.
The high degree of automation of our processes and the excellent know-how of our security analysts guarantee the quality of our work. We use tools developed in-house and quality assured as well as tools from internationally recognized manufacturers. This allows our security analysts to carry out their tests even more efficiently and comprehensively and leaves time for targeted, manual analyses.
The heart of our technology environment.
With a constantly growing number of preconfigured server environments, different technologies and vulnerabilities, the usd PentestLab represents our training, research and event environment.
OUR TOOLS & PLATFORMS
We place the highest demands on the quality of our work. To ensure that security analyses are always carried out with constant efficiency and quality, our own tools are subject to strict quality management and optimization processes, taking into account the results of our research.
Our platform for joint process and vulnerability management.
The platform features importing assets, assigning responsible persons, a secure role and user concept, booking security analyses, creating customizable reports and dashboards, viewing identified vulnerabilities and remediation processes as well as an integrated service management. Acting together. Transparent, secure and efficient.
Analysis tool for all team members.
It combines the best publicly available tools and usd in-house developments for security analyses of systems and applications. Our knowledge database for a consistently high quality level of your security analyses.
Support all team members in planning and collaborating during a project.
Map of our long-standing proven internal processes for the execution of pentests and security analyses. Integrated checklists for verifiable, uniform and high-quality project implementation.
The results of our analyses prepared for you.
Receive consistent high quality reports. Identified vulnerabilities are explained in detail and threats and potential impacts are described. For each vulnerability, you receive recommendations for a fast and verifiable remediation.