Pentest Summer 2025
Pentest Summer 2025
Stay cool,
when it comes to your
cyber security.
Stay cool,
when it comes to your
cyber security.
Safe through the summer and benefit all year round.
Book a penetration test of your choice, to be conducted between June 1 and September 30, 2025, and receive an exclusive additional offer:
4 free vulnerability scans, tailored to the booked Pentest variant!
The vulnerability scans will be performed quarterly, starting with the fourth quarter of 2025.
The subsequent scans will take place in the first, second, and third quarters of 2026, ensuring that you keep an eye on the security of your systems throughout the winter months and until the next summer of 2026.

Safe through the summer and benefit all year round.
Book a penetration test of your choice, to be conducted between June 1 and September 30, 2025, and receive an exclusive additional offer:
4 free vulnerability scans, tailored to the booked Pentest variant!
The vulnerability scans will be performed quarterly, starting with the fourth quarter of 2025.
The subsequent scans will take place in the first, second, and third quarters of 2026, ensuring that you keep an eye on the security of your systems throughout the winter months and until the next summer of 2026.

Find the penetration test that's perfectly tailored to your needs.
Every IT infrastructure is unique,
that’s why we offer tailored penetration tests precisely aligned with your specific requirements.
Whether you want to test your externally accessible IT infrastructure or your internal systems –
our team of experts identifies vulnerabilities before attackers can exploit them.
Our penetration tests not only provide you with a detailed security report,
but also offer actionable recommendations to address the identified vulnerabilities.
Choose the type of test that fits your IT landscape and individual security goals.
The 4 free vulnerability scans cover the same scope as the booked penetration test.
Below, you’ll find more information about our external and internal penetration testing services:
An external vulnerability scan identifies security weaknesses in your internet-facing systems, such as web applications, servers, and network devices. It helps detect potential entry points for cyberattacks before they can be exploited by malicious actors.
We offer two types of external vulnerability scans:
We conduct a comprehensive vulnerability scan and manually review the results to filter out false positives. While this improves accuracy, it is important to note that this is not a full penetration test and does not include active exploitation or in-depth security analysis.
Prerequisites:
To perform the scan, the only prerequisite on your side is to whitelist our scanner’s IP address to ensure uninterrupted access to your external systems.
Outcome:
The outcome of the vulnerability assessment is documented in the form of a report which contains a summary of the high-risk vulnerabilities, visually depicting the overall threat level and a full list of all findings, including technical details and recommendations. This report can be used by management to get an overview of the security posture of the IT environment and represents the basis for technicians to address the identified risks.
An internal vulnerability assessment identifies security weaknesses within your internal network, helping to detect misconfigurations, outdated software, and other vulnerabilities that could be exploited by attackers who gain access to your environment. This proactive approach enhances your overall security posture and minimizes internal risks.
We conduct a comprehensive vulnerability scan and manually review the results to eliminate false positives, ensuring that you receive accurate and actionable insights. Additionally, we offer authenticated scans, which provide deeper visibility into system patch levels and security configurations by using valid credentials to assess internal assets more thoroughly.
Prerequisites:
To perform the assessment, we require either a VPN connection to your internal network or access to a virtual machineor cloud instance that we provide for scanning.
Outcome:
The outcome of the vulnerability assessment is documented in the form of a report which contains a summary of the high-risk vulnerabilities, visually depicting the overall threat level and a full list of all findings, including technical details and recommendations. This report can be used by management to get an overview of the security posture of the IT environment and represents the basis for technicians to address the identified risks.
No surprise, just the right price!
Infrastructure and Standard-Software:
+4 Vulnerability Scans: € 2.999,00
Estimated Total Cost: € -,--

Got any questions left?
Feel free to check out our Pentest FAQ – or get in touch with our team directly at
+43 1 8903625.
We’re happy to provide you with personal, no-obligation advice.