#/System Penetration Testing


Together with your team, we define beforehand the characteristics and goals of a penetration testing – what kind of attack you want us to simulate, what the attacker’s motivation is, is the attacker internal or external to your company, and similar. Then we perform a controlled attack on the infrastructure of your organization (web devices, servers, users’ computers) and/or eventual hired outside infrastructure (IaaS), which is physically located outside of your organization. There is no harm done to the infrastructure. During the test, we record all deficiencies that are then included in the report. We also provide recommendations for the abolishment of deficiencies. This gives you the information on the softest points in your system.

For whom

The system penetration testing is suitable for companies that have already taken security measures, and now want to verify the efficiency of these measures. Namely, the penetration testing is not a complete security audit but is rather aimed at discovering the security deficiencies that enable the attacker to reach their goals as simply as possible.


After concluding the project, you will receive a detailed report about the results of the system penetration testing, including:

  • basic information about the project
  • a report for the management
  • a review of the goals of the penetration testing
  • the course of the penetration testing, along with data and access that was gained
  • a description of other possible attack scenarios
  • a review of discovered deficiencies
  • findings and recommendations

Custom services