A penetration test is an empirical security check, whereby the test itself is limited by predefined framework conditions. Real and/or common means and techniques of potential attackers are used. The results obtained in the course of the test represent a snapshot of the components to be tested from a defined perspective. In general, the number of vulnerabilities found increases with the invested effort and the available information about the systems to be tested.
The result of the penetration test is recorded in a report that lists the vulnerabilities, misconfigurations and best practice recommendations identified at the time of the test.
- Proactive testing of your security level to prevent unpredictable costs from cyber attacks
- Proof of compliance with the due diligence obligations of IT infrastructure management in the context of business-critical, sensitive and personal data
- Situation picture of IT security through an independent external technical audit
- Recommendations for security measures to increase the security level of your organization in the long term
- Counteracting with optimised measures to prevent potential financial, reputational or public safety damage
- We are very familiar with the handling of highly sensitive data, especially in a governmental environment
- We are daily confronted with the challenges of technology, security technology, science and research
- We have a recognised position in national and international security research and in various innovation programmes
- We maintain strategic partnerships with important national security actors (BMI, BMLV, BKA, national CERTs) as well as a number of international industry initiatives
- Research projects and the use of cutting edge technologies enable us to assess future risks and attack vectors at an early stage
- Our experts are certified <Link to logos of the certifications>
- We are Austria's largest non-university research institution and support the Austrian economy as an interface between science and industry; this results in a pragmatic approach in terms of efficiency and effectiveness
- Optimal alignment, so that a high degree of efficiency of IT investments and secure operation of IT services can be ensured at low cost
- Wiener Wohnen
What we offer
The majority of penetration tests offered on the market focus on the exploitation of already known vulnerabilities. In this case, the testers rely on automated evaluation of the security level of the components under test, supported by security software. We pursue an alternative approach here. Our specialists contribute their expertise from a large number of top-class research projects. As a result, previously unknown, completely new vulnerabilities (zero-day vulnerabilities) are found during the tests.
We support you from the first prototype to the final implementation. Both with the black-box approach (without detailed knowledge of the system to be tested, e.g. via fuzzing and reverse engineering), and in the white-box setting (complete information up to comprehensive source code analysis), we have the necessary know-how and many years of project experience.
|IT-Security||Information security management|
|Certified Information Systems Security Professional (CISSP)||Certified Information Systems Auditor (CISA)|
|Certified Ethical Hacker (CEH)||Certified Information Security Manager (CISM)|
|Offensive Security Certified Professional (OSCP)||Certified in Risk and Information Systems Control (CRISC)|
|Offensive Security Certified Expert (OSCE)||Trusted Security Auditor (TSA)|
|Cisco Certified Network Professional - Security (CCNP Security)||IEC 62443 Security Zertifizierungen der ISA|
|CWSP, CHFI, ECSA||Certified Information Privacy Manager (CIPM)|
|and many more...||and many more...|
Security Advisories (CVEs)
Our security experts are constantly finding new, previously unknown (zero-day) vulnerabilities in penetration tests. If these do not directly affect one of our customers, but a manufacturer that is in the public interest, we report details of the found zero-day vulnerability exclusively to the manufacturer of the component. In order to protect their clients, they will be granted a reasonable period of time to resolve the problem and to roll out the corresponding patches on their client systems before details of the vulnerability are published.
The following is an excerpt of relevant zero-day vulnerabilities found by AIT - click to see more.
- ThreatGet - Threat Analysis and Risk Management