Penetration testing

Protect your company why penetration testing is essential

Cyber ​​attacks are constantly increasing and can have catastrophic consequences. The impending consequences are data loss, downtime of critical systems, loss of customer trust and high costs for repairing damage. In order to avoid this, it is necessary to regularly review your own IT security precautions. This is particularly true for companies in particularly vulnerable sectors such as healthcare, financial services, energy, and e-commerce.

Your advantages

Solid IT security helps to increase your company value

Risk limitation

Our penetration tests are the most effective method for uncovering inadequacies in your IT security

Return on investment

At the end of your penetration test, you will know exactly where your IT security budget should be spent most sensibly

Compliance

Our penetration tests meet the requirements of relevant standards such as PCI DSS and KRITIS

Strengthen customer trust

Regular IT security audits strengthen your customers’ trust in your company

data protection

We quantify your risk to the accessibility of internal systems and confidential information

Business continuity

In the event of a cyberattack, you can maintain uninterrupted business operations

Certifications

All penetration testing is conducted by a GPEN certified Cloud Cape Senior Security Consultant.

Your pentest with Cloud Cape

Our pentest offer

We carry out a wide range of penetration tests for you. We determine the information basis (black box, gray box or white box test) and test depth individually with you.

This penetration test is aimed at your external infrastructure. Our pentester replicates the same type of attacks hackers can use by finding and mapping the vulnerabilities in your external infrastructure.

Our web application penetration testing includes manual and automated methods to identify vulnerabilities, vulnerabilities or threats in your web application. Our penetration testers represent attacks from an attacker's perspective, e.g. through SQL injection tests. The main result is the identification of security weaknesses throughout the web application and all its components (source code, database, back-end network).

In contrast to a traditional penetration test, the cloud provider is the owner of the technical infrastructure. Because you only use the Service, your ownership is limited to your data stored there. Therefore, we need to overcome some challenges before and during the penetration test. These challenges are both technical and legal. We see ourselves as a next-generation managed security services provider and therefore offer you special pen tests for your cloud environments. We support both Amazon AWS and Microsoft Azure.

Penetration test price overview

Choose your suitable offer

Find out about our range of penetration testing to strengthen your company’s cybersecurity.

ab 4480€/zzgl. USt.

Checking the protective measures at network level
(approx. 4 test days)

Standard Penetrationstest

ab 6720€/zzgl. USt

Checking the protective measures at network and application level
(approx. 6 test days)

Advanced Penetrationstest

ab 7125€/zzgl. USt

Review of protective measures for cloud networks and applications
(approx. 6 test days)

Elite Cloud Penetrationstest

Get an insight

Request a sample report

Get a sample copy of a detailed final report now directly to your email inbox. This gives you a good overview of what we have to offer. Our final reports contain the following core components:

Penetrationstest-Abschlussbericht-1

Frequently asked questions

Penetration test FAQ

Do you have any questions about our penetration tests?

The price depends largely on the scope and complexity of the test. You can find out more in our blog article. Please contact us for a non-binding offer for your individual project.

This depends on a variety of factors, such as how large your environment is and how often it is subject to change. Last but not least, it also depends on your budget restrictions. We will be happy to advise you on solutions that focus on the most critical assests and can also be realized with a smaller budget.

We carry out our penetration tests according to the latest state of the art and with due care in order to prevent disruptions to operations. Typically, we also agree a balanced test intensity with our customers.

A vulnerability scan, like a pentest, is a sensible IT security measure, but is less in-depth and is carried out exclusively with automatic scanning tools. For more detailed information, take a look at our blog.

To ensure that everything runs smoothly, you will need to provide a number of basic services. These include, for example, providing a contact person and notifying users in advance. Before the test begins, we will of course inform you of all your obligations to cooperate.

The time window for active testing during penetration tests should not be longer than one week. If a very large effort is required, an appropriate penetration test team should be deployed.

A professional penetration test of Cloud Cape requires a certain amount of preparation time. This is typically 2-4 weeks.

Cloud Cape complies with the highest industry standards for all pentests. E.g. OWASP and Penetration Testing Execution Standard (PTES),

We are happy to carry out an optional follow-up test for you.

individual offer

Would you like an individual offer? Please fill out the form and we will contact you as soon as possible.