Penetrationtests/Red Team
- Vulnerability Scan
Concerned about your IT security?
We detect hidden threats, protect you from unnoticed attacks, and identify all potential vulnerabilities in your IT environment.
To identify weaknesses in a network or computer system, various methods can be applied. One such method for detecting potential risks is the automated IT vulnerability scan, also known as a vulnerability scan.
This automated scan is performed by software that accesses a database of known security flaws, allowing it to detect various threats. The process enables early identification and remediation of potential vulnerabilities before they can be exploited by attackers.
With our regular vulnerability scans, you can proactively protect your systems and enhance the security of your IT infrastructure. This significantly contributes to ensuring the integrity, confidentiality, and availability of your data and systems.
Vulnerability Scan, Vulnerability Analysis, and Vulnerability Management: The Differences
Vulnerability Scan:
An automated process that uses specialized software to check IT systems for known security flaws. It provides an initial overview of potential risks but does not assess their exploitability.
Vulnerability Scan, Vulnerability Analysis, and Vulnerability Management: The Differences
Vulnerability Analysis:
Goes beyond scanning by manually evaluating the identified vulnerabilities. It prioritizes them based on risk and provides concrete recommendations for action.
Vulnerability Management:
A continuous process that includes regularly identifying, assessing, prioritizing, and remediating security vulnerabilities. It combines automated scans with manual analysis to sustainably improve IT security.
The vulnerability scan thus serves as an automated tool that provides an initial overview of potential security gaps. The vulnerability analysis deepens these results through manual evaluation and prioritization.
Following this, a penetration test can be conducted, which takes it a step further by testing the actual exploitability of the vulnerabilities.
Finally, vulnerability management integrates all these steps into an ongoing process to ensure and enhance IT security.
Contact the experts at TÜV TRUST IT for an IT vulnerability scan
At TÜV TRUST IT GmbH, we support you with our many years of experience. As a certified IT service provider, we assist you in all areas of IT security.
Do you have questions or are interested in working with us? We’re always here for you!
Book your automated IT vulnerability scan now and let us uncover potential threats in your digital infrastructure!
Vulnerability Scan
Paket S
- Selection of up to 9 systems by the customer
- Review of the selected systems for open ports and accessible services
- Automated vulnerability scan that checks systems for known vulnerabilities, misconfigurations, and security issues
- Random sampling verification of the identified vulnerabilities
- Report listing the identified vulnerabilities (including description, risk classification, and recommendation) in Excel format
Price 990,- €
plus VAT
Vulnerability Scan
Paket M
- Selection of up to 9 systems by the customer
- Review of the selected systems for open ports and accessible services
- Automated vulnerability scan that checks systems for known vulnerabilities, misconfigurations, and security issues
- Verification of the identified vulnerabilities
- Additional manual checks on up to 3 systems
- Report listing the identified vulnerabilities (including description, risk classification, and recommendation) in Excel format
Price 1.990,- €
plus VAT
Vulnerability Scan
Paket L
- Random sampling review of existing network diagrams and IT documentation
- Selection of up to 12 systems by the auditor and the customer
- Identification of initial attack vectors based on the reviewed documents
- Review of the selected systems for open ports and accessible services
- Automated vulnerability scan that checks systems for known vulnerabilities, misconfigurations, and security issues
- Verification of the identified vulnerabilities
- Additional manual checks on up to 6 systems
- Report listing the identified vulnerabilities (including description, risk classification, and recommendation) in Excel format
Price 2.990,- €
plus VAT
- Phishing
In everyday work with IT systems, awareness of cybersecurity is crucial.
One of the most effective ways to raise employee awareness is through an internal phishing campaign.
Phishing emails are a commonly used method to attack companies. They aim to trick employees into opening attachments or clicking on links, thereby unknowingly granting access to the corporate network.
With our customized phishing simulations, we help you raise awareness among your employees about such threats. They learn to recognize suspicious messages early and simultaneously strengthen their overall understanding of cyber risks. This way, you actively and sustainably protect your company.
Our packages offer practical solutions tailored to current threats. Book a package and prepare your employees for safe handling of emails and IT systems.
Overview of Our Phishing Packages
We offer two customized phishing campaigns tailored to the specific needs of your company:
Phishing Campaign “Package S”
This entry-level package is designed for up to 200 recipients and uses simple, non-targeted emails with randomly selected scenarios.
The goal is to sharpen your employees’ attention to potential phishing attacks by directing them to a simulated website where they are prompted to enter their login credentials.
After the campaign, you will receive a clear report including a brief description of the scenario, evaluation of the results, and general recommendations to sustainably strengthen security awareness.
Phishing Campaign “Package L”
This more comprehensive package is designed for up to 500 recipients and includes targeted emails that we develop together with you.
The phishing emails are specifically tailored to your company, using elements such as insider knowledge, personalized greetings, or company-specific domains, making them appear particularly realistic.
Recipients are prompted either to visit a manipulated website and enter their login credentials or to open a file.
After the campaign, you will receive a detailed report including a comprehensive scenario description, in-depth evaluation of the results, and concrete recommendations for action.
The Phishing Test by TÜV TRUST IT
A phishing scan is a preventive measure to increase your employees’ awareness of phishing attacks and strengthen IT security within your company.
Through targeted simulations, we reveal potential vulnerabilities and raise awareness of real-world threats.
With our campaigns, you sustainably strengthen the security culture in your organization and sensitize your employees to cyber risks.
This helps reduce the risk of successful attacks and actively protects the integrity of your company’s data.
Contact us for professional execution!
- Webapplication-Scan
In an increasingly interconnected world, web applications often serve as the entry point for cyberattacks. To optimally protect your digital infrastructure, we offer our comprehensive web application scan.
Based on the renowned Open Web Application Security Project (OWASP) Testing Guide, our IT security experts specifically analyze vulnerabilities in your web app. Through structured testing and detailed reports that include concrete recommendations for action, we help you significantly improve the security level of your applications.
Rely on our years of experience and extensive expertise to sustainably secure your web application!
Protect your data, customers, and business processes from the harmful consequences of cybercrime – book one of our web application scans today.
Our Services in the Area of Web App Scanning
Our web app scan begins with a comprehensive analysis of your target application to thoroughly understand its structure and functionality. We then conduct a security scan using automated tools to identify known vulnerabilities such as SQL injection and cross-site scripting (XSS). These tools simulate potential attacks to uncover risks to your application.
In addition to automated testing, a manual analysis is carried out by our security experts.
They review the scan results to eliminate false positives and uncover complex security issues that automated tools may overlook. This manual analysis is a crucial part of our process to ensure that all security aspects are thoroughly considered.
After completing the analysis, our experts compile a detailed report.
This report summarizes the identified vulnerabilities, assesses their criticality, and provides recommendations for remediation. You receive a clear documentation of your web application’s current security status along with actionable suggestions.
Web App Scans and Additional Penetration Tests by TÜV TRUST IT GmbH
A web application scan is a comprehensive method that combines both automated and manual techniques to ensure the security and integrity of your web applications. By identifying and addressing vulnerabilities early, the risk of cyberattacks is significantly reduced. This protects your sensitive data and ensures the confidentiality and integrity of your information.
- Agile Cybersecurity Quick Test
Do you have a nagging feeling that your IT security might not be strong enough?
Are you wondering whether attackers may already be moving unnoticed within your infrastructure? Many companies are unsure where potential vulnerabilities lie – our Agile Cybersecurity Quick Test provides fast and straightforward clarity.
Your Benefits
- Quick and cost-effective overview of your current IT security status
- Concrete actions and recommendations for improvement
- Suitable for both external and internal systems and networks
Why a Cybersecurity Test Is Essential Today
In our digital world, companies rely more than ever on connected systems and digital data. However, this dependency also makes them more vulnerable to cyberattacks, which are becoming increasingly frequent and sophisticated. Attackers constantly develop new methods to steal data, manipulate systems, or disrupt entire business operations. The consequences can be severe: financial losses, loss of customer trust, or even legal repercussions.
A cybersecurity test helps identify such risks at an early stage. It reveals how effective your current protective measures are and provides valuable insights for optimization. This allows you to act proactively instead of reacting to incidents — securing the long-term viability of your business.
At TÜV TRUST IT, we understand the challenges you face and are your reliable partner in strengthening your cybersecurity.
The Agile Cybersecurity Quick Test follows a clear and transparent process:
- Screening Phase: Together, we examine your IT landscape, define the relevant systems, and identify initial potential attack surfaces.
- Vulnerability Analysis: We scan and test your systems to detect open ports, known vulnerabilities, or misconfigurations.
- Evaluation & Reporting Phase: You receive a clear documentation of the results. Our experts explain the findings in person and provide concrete, practical recommendations for action.
This quick test lays a solid foundation for sustainably strengthening your IT security – fast, reliable, and with clear steps for action.
Even More for Your Security
In addition to the quick test, we offer further assessments such as IT vulnerability scans, web application scans, a Microsoft 365 security audit, or phishing campaigns. This allows you to flexibly expand your security strategy step by step. Get in touch with our experts!
- Microsoft-365 Security Audit
Cloud services and remote work have long become part of everyday life in modern companies.
The flexibility and efficiency enabled by Microsoft 365 are a real asset—but they also introduce new challenges for IT security.
Using Microsoft 365 services such as Defender, Teams, SharePoint/OneDrive, Entra, Power Platforms, and Exchange Online carries risks if not properly secured. Unauthorized access, data loss, or misconfigurations can quickly become serious threats.
With our specialized Microsoft 365 audits, you receive a comprehensive and manual review of your entire environment.
Our experts identify potential vulnerabilities, assess risks, and provide you with concrete recommendations to optimize your security measures.
Together, we ensure that your data is reliably protected, compliance requirements are met, and your digital workflows remain secure.
Secure your Microsoft 365 environment – book one of our packages today!
- Red Teaming Assessments
Red Teaming is an in-depth security test in which our experts take on the role of real attackers and carry out realistic attack scenarios against your organization. This process not only examines technical systems but also includes organizational procedures and human factors in the analysis. The result is an authentic picture of your defense capabilities and concrete recommendations to sustainably increase your resilience.
You gain a clear overview of how effective your security measures truly are in a real-world scenario. Based on this, you can strategically enhance your protective mechanisms and optimally prepare your organization for future threats.
Your Benefits
- Introduction and training of a Blue Team
- Simulations of realistic cyberattacks
- Evaluation of the effectiveness of defense mechanisms
- Detailed report with comprehensive documentation for step-by-step traceability
- Gradual improvement of IT security
- Assessment of physical security measures (access controls, tailgating tests, physical social engineering)
With our Red Teaming Assessments, you go beyond traditional penetration tests to holistically strengthen the security of your IT infrastructure and proactively prevent potential attacks.
How a Red Team Pentest Works – Stay Secure with TÜV TRUST IT
A Red Team Assessment follows a clear but flexibly adaptable process. In the Reconnaissance Phase, we first gather all relevant information about your company—from organizational structure and IT systems to IP addresses and publicly available employee data. Based on this, we develop targeted attack scenarios in the Weaponization Phase, such as crafted documents or phishing campaigns.
In the Delivery Phase, we introduce the attack vectors into your infrastructure in a controlled manner (e.g., emails, manipulated websites). If access is successful, we exploit existing vulnerabilities in the Exploitation Phase, establish persistent access in the Installation Phase if needed, and simulate communication with our control systems in the Command & Control Phase. In the final Actions-on-Objective Phase, we pursue defined goals, such as extracting sensitive data or spreading within the infrastructure.
Throughout the entire assessment, we operate discreetly to maintain realism—only a very small, informed group within your organization is aware of the test. After completion, you receive a detailed report that transparently outlines the approach and identified vulnerabilities, along with practical, actionable recommendations to strengthen your defenses.
Red Teaming Assessments with TÜV TRUST IT – Strengthening IT Security Together
The greatest added value comes from close collaboration between our Red Team and your internal security team. Through this partnership, we promote knowledge transfer and help you continuously improve your defense strategies and sustainably increase your organization’s resilience.
Do you have questions? Feel free to contact us!
- SAP Pentest
SAP Pentests and Authorization Analyses
SAP systems are the backbone of many companies. They manage core business processes such as resource planning, procurement, production, and human resources.
Due to their complexity, however, they present a large attack surface—especially for unauthorized access to highly sensitive corporate data.
Our service addresses this exact challenge: We specifically examine user access and permissions within your SAP environment.
Unlike traditional penetration tests, which focus on technical vulnerabilities, our approach centers on internal authorization structures.
We realistically test whether critical or unauthorized actions can be performed using regular user accounts—even if such actions are organizationally prohibited.
This ensures that access rights are correctly assigned and that no hidden gaps exist that could pose a risk to your company.
Your Benefits
- Early identification of misconfigurations
- Prevention of data misuse due to incorrectly assigned permissions
- Strengthening of organizational security
- Realistic assessment of potential threat scenarios
- Fulfillment of relevant compliance requirements
With an SAP pentest, you proactively protect your systems and lay the foundation for continuously reviewing and optimizing your security policies.
Choose an SAP Pentest to Strengthen Your IT Security
An SAP pentest is a targeted, simulated attack designed to uncover potential vulnerabilities before they can be exploited by malicious actors.
Together with you, we define the scope and objectives at the beginning of the assessment.
Our experts then conduct a detailed analysis of your SAP systems, using both automated tools and manual testing methods.
If vulnerabilities are identified, we attempt to exploit them in the next step.
This allows us to assess the actual level of exposure in your system and understand the potential impact of a real-world attack.
We simulate realistic scenarios—from unauthorized privilege escalations to access to highly sensitive data.
After completing the SAP pentest, you will receive a comprehensive report that transparently documents all identified issues, includes prioritized recommendations, and outlines concrete measures for improvement.
In a personal debriefing session, we explain the results and support you in implementing the necessary enhancements.
SAP Pentest and Additional Services by TÜV TRUST IT GmbH
With an SAP pentest, you ensure that your systems are reliably protected against current threats and that your sensitive data remains securely safeguarded at all times.
- Assume Breach
Assume Breach is a component of Red Teaming in which a full-scale cyberattack is simulated.
The idea behind it: Assume that attackers have already managed to bypass initial security barriers and inject malware—whether through a phishing email or a file download.
We then test the execution of the malware (Initial Access) and assess its impact.
Your Benefits
- Realistic attack simulation: Tailored to your IT infrastructure
- Identify entry points: Discover vulnerabilities before others do
- Optimize detection mechanisms: Prepare your security solutions for current threats
- Uncover vulnerabilities: Technical and organizational—we find them all
- Purple Teaming: Train your Blue Team with real-world attack scenarios
- Meet regulatory requirements: For example, in accordance with DORA
Find out how your systems respond to targeted attacks and sustainably improve your security measures with our comprehensive Assume Breach Assessment!
Measures with the Scope of Assume Breach
A Closer Look at Your Security Solutions
Together, we take a close look at your detection mechanisms to ensure they can identify advanced threats early and respond appropriately.
In doing so, we identify technical and organizational vulnerabilities that attackers could exploit.
This enables you to implement targeted improvements and strengthen your overall security strategy.
Purple Teaming – Collaboration for Greater Security
Our offensive and defensive security experts work closely with your team to simulate attacks and test countermeasures in real time.
This prepares your IT teams effectively for real-world threats.
At the same time, you fulfill regulatory requirements, such as those outlined in the Digital Operational Resilience Act (DORA).
Long-Term Protection and Competitive Advantage
This approach helps you continuously uncover vulnerabilities and identify opportunities for improvement.
Your resilience against cyberattacks is strengthened, as you can respond to threats early and minimize their impact.
Through regular testing, you stay one step ahead of evolving threat scenarios—ensuring your company remains protected and ready to act at all times.
Your Trusted Partner – Get in Touch
At TÜV TRUST IT GmbH, we have been supporting companies for many years in the areas of information security and IT quality.
Our certified experts bring extensive experience from a wide range of projects and help you sustainably improve your security strategy.
If you’re interested in an Assume Breach test, our team is here for you.
Feel free to explore our additional services in the field of cyber security!
- Trusted Application: Certification for Applications on SAP®-BTP-Platform
This service is a technical security analysis of the environment of your SAP® BTP application. The aim of this measure is to identify points of entry and uncover vulnerabilities in the environment of your SAP® BTP application. In doing so, we support you in reviewing the security level of your SAP® BTP application and thereby optimizing your IT security measures.
This service can be used both generally in companies for deployed SAP® BTP applications (custom developments), as well as by providers/manufacturers of such applications.
Based on the renowned Open Web Application Security Project (OWASP) Testing Guide, our IT security experts specifically identify vulnerabilities in the environment of your SAP® BTP application.
All results of the partial assessments are documented in detail with appropriate recommended measures and classified accordingly (including evidence and risk classification).
If the assessment yields a positive result, an optional certificate with a test seal can be issued, which documents the quality of the application. This certificate is valid for three years.
With our expertise in technical security and SAP® Security, we ensure that your SAP® BTP web application is secured, thereby sustainably protecting your IT backend systems. Protect your data, customers, and business processes from the harmful consequences of cybercrime.
Your benefits
General use of a SAP® BTP application (custom development):
- Increase in SAP® Security
- Protection of your company and customer data
- Comprehensive audit report highlighting potential for improvement
- Proof for your internal audit that a reviewed SAP® BTP application is in use
- Optional TÜV seal for use and publication of the certificate on our website
As a provider or manufacturer of a SAP® BTP application:
- Trust for your customers and better positioning compared to your competitors, support in acquiring new customers
- Proof to your customers and business partners that your application meets the required level of quality and security
- TÜV seal for use in your marketing and publication of the certificate on our website