Frequently Asked Questions
- Who are our pentesting services intended for?
- What's the difference between us and other service providers?
- Why is my application/system a target for hackers?
- Is my application secure after performing a pentest?
- What is the difference between black-box, grey-box and white-box pentesting?
- How do you prepare for a pentest?
- What is the best timing to perform a pentest?
- What is the lead time for a pentest?
- How often do I have to perform a pentest?
- What information must be provided in advance for a pentest?
- What is the difference between an OWASP Top 10 and NCSC report?
- What are the advantages of manual testing methods?
- How do you effectively perform a retest?
- Why are pentest preferably executed on the acceptance/test environment?
- The acceptation-/test environment is running on the same server as the production environment. Is this a problem?
- Why should I whitelist IP-addresses for IPS, IDS and rate-limiting systems during a pentest?
- Why should I adjust SMTP settings for a pentest?
- Can I get support for fixing security issues in the source code?
- What are the advantages of using the scan sensor?