A penetration test is an empirical security check using tools and techniques of real attackers. The results represent a snapshot of the current security level of tested components under a certain perspective. In general, the number of vulnerabilities found increases with time invested and the level of information available about the systems to be tested.
The result of the penetration test is a report which lists the vulnerabilities, misconfigurations and best practices identified at the time the tests were performed.
- Demonstrate compliance with IT infrastructure management and due diligence requirements in the context of business-critical, sensitive, and personally identifiable data
- Get an overview of the state of IT security through an independent external audit
- Recommendations for necessary or reasonable security measures to increase the security level of your products in the long term
- Proactive testing of your security level to prevent unpredictable costs from cyber attacks
- Minimize risks of potential financial, reputational, or public safety damage
- We are very familiar with the handling of highly sensitive data, especially in a governmental environment
- We are confronted daily with the challenges of technology, security technology, science, and research
- We have a recognized position in national and international security research and various innovation programs
- We maintain strategic partnerships with important national public security actors and national CERTs as well as international industry initiatives
- Research projects and the use of cutting edge technologies enable us to assess future risks and attack vectors at an early stage
- Our experts hold industry leading and well recognized certificates in all areas of IT-Security and Penetration Testing
- We are Austria's largest applied research institution and support the Austrian economy as an interface between science and industry; this results in a pragmatic approach in terms of efficiency and effectiveness
- Optimal alignment, so that a high degree of efficiency of IT investments and secure operation of IT services can be ensured at low cost
What we offer
The majority of penetration tests offered on the market focus on the exploitation of already known vulnerabilities. In this case, the testers rely on the automated evaluation of the security level of the components under test, supported by security software. We pursue an alternative approach. Our specialists contribute their expertise from numerous top-class research projects. As a result, previously unknown, completely new vulnerabilities (zero-day vulnerabilities) are found during the tests.
We support from the prototype to the final implementation. Both with the black-box approach (without detailed knowledge of the system to be tested, e.g. via fuzzing and reverse engineering), and in the white-box setting (complete information up to comprehensive source code analysis), we have the necessary know-how and many years of project experience.
|IT-Security||Information security management|
|Certified Information Systems Security Professional (CISSP)||Certified Information Systems Auditor (CISA)|
|Certified Ethical Hacker (CEH)||Certified Information Security Manager (CISM)|
|Offensive Security Certified Professional (OSCP)||Certified in Risk and Information Systems Control (CRISC)|
|Offensive Security Certified Expert (OSCE)||Trusted Security Auditor (TSA)|
|Cisco Certified Network Professional - Security (CCNP Security)||IEC 62443 Security Zertifizierungen der ISA|
|CWSP, CHFI, ECSA||Certified Information Privacy Manager (CIPM)|
|and many more...||and many more...|
Security Advisories (CVEs)
Our security experts are constantly finding new, previously unknown (zero-day) vulnerabilities in penetration tests. If these do not directly affect one of our customers, but a manufacturer that is in the public interest, we report details of the found zero-day vulnerability exclusively to the manufacturer of the component. In order to protect their clients, they will be granted a reasonable period of time to resolve the problem and to roll out the corresponding patches on their client systems before details of the vulnerability are published.
The following is an excerpt of relevant zero-day vulnerabilities found by AIT - click to see more.