Reliable security assessments for a secure website
- We are IT security experts who help you secure your web applications.
- We use proven hacking methods and techniques, used by real hackers.
- Get personal advice in determining the appropriate security assessment.
- Manual and automated tests combined.
Manual and automatic checks on all types of vulnerabilities such as SQL-injections, Cross-site scripting, weak passwords, hidden files and much more.
Single or Periodic Tests
Decide whether you prefer a one-time pentest, re-test or periodic (black-box) security checks on your web application. We are happy to think along with you for a suitable solution.
Proven Track Record
Having supported 100+ different organizations (large, small, private, public), we have established a succesfull track record.
Availability of multiple report formats, including comprehensive developer reports, concise management reports and reports based on the OWASP Top 10 or NCSC guidelines.
Receive personal support during the entire security process, from intake to discussing test results, fixing vulnerabilities and re-testing.
Manual Code Analysis
Certified (CISA, CISSP, CEH) and experienced web security and web development experts can analyse the source code without extra costs, if the data is available.
Support for all Technologies
Support for all types of web techniques, such as PHP, .NET and Java. We also have broad experience with commonly used CMS types, including WordPress, Drupal, Magento, Joomla and TYPO3.
Based on the goal, client requirements and information available beforehand, we conduct customized black-box, grey-box, white-box, crystal-box and time/budget-box pentests.
Show you highly value data security and boost consumer trust. Place the Web Security Scan trustmark logo on your website when no severe vulnerabilities have been found.
Scanned by Web Security Scan
Why would you perform a pentest?
55% of all websites are vulnerable
Research shows that a stunning 55% of all web sites/web applications contain multiple vulnerabilities. Cross-Site Scripting and Information Leakage prove to be most frequent vulnerabilities in the applications. The graph below shows the probability that a vulnerability class is encountered at least once in a website.
Recommended by the Dutch National Cyber Security Centre
In the "IT Security Guidelines for Web Applications" (version 2015), the Dutch National Cyber Security Centre states as highly classified security guideline: B.08 - Penetration tests are performed periodically. The NCSC-guidelines provide guidance for the safe development, management and delivery of web applications and associated infrastructure.
Performing a penetration test is implicit in change management (see measure B0-6), but is individually addressed with regard to its importance. From a security perspective, it is important that via a penetration test (also called pentest) it is determined whether the web application and / or infrastructure can be compromised or misused in any way. Penetration tests are therefore a valuable addition to the security of web applications.NCSC
Proven Hacking Methods and Techniques
We are IT security experts who help you secure your web applications. We use proven hacking methods, techniques and software, used by real hackers.
Manual and Automated Tests Combined
We manually interact with your web application to analyse its behavior. In contrast to many security services we don't simply run our security software. We use the combination of manual and automated tests for the most accurate and thorough results.
Knowledge and Experience from Web Development
Web Security Scan is part of DongIT. We conduct security assessments/penetration tests and we develop secure web applications. Knowledge and experience from web development is used for pentesting and vice versa. This gives the Web Security Scan's quality of service just that bit of extra.