professional

We test the security of the IT infrastructure of companies and authorities in realistic attack scenarios.
Be one step ahead with us!


Exclusive Pentest Team of
arrow-button-down-1

People define IT security - for this reason, we deliberately distance ourselves from the exclusive use of simple software scans, which in no way provide a concrete statement about the realistic security level of IT systems.

Comprehensive and manual auditing is one of our trademarks, as is close collaboration with our customers' IT. Hardening a system optimally means looking at it with the combination of the administrator's knowledge and the hacker's skills.

After simulating a realistic external attack scenario, our focus is always on securing the internal network structure. This ensures that security concepts will hold up even if individual systems are compromised (for example, through the misconduct of an employee).

Since every purchased security solution can also become a risk at the same time, our recommendations are mostly logical in nature. In this way, the customer saves financial resources, develops his own solutions, and is not affected if vulnerabilities become known in the future in security systems that are still considered reliable today.

A team of experts is available for your individual projects

We deliver uncompromising security for our customers. Each project is individually tailored to you and managed and executed by one of our teams.

White hacking / pentest

Through tests without any prior knowledge, up to code analysis of in-house developed server applications, we offer you and your IT department insights into realistic attack scenarios and potential consequences in a controlled environment.

In addition we offer

With us you are always one step ahead.

You have the option of having any potential security risk to your company reviewed and assessed as part of a penetration test.

Exemplary sequence of a pentest

Preparation

Objective setting and definition of the framework.

Contract

Mutual signing of a contract for a penetration test. This contains precise information about the objectives, deadlines and conditions.

Test phase

Implementation of the penetration test by certified staff.

Follow-up discussion

Discussion of important / critical findings. Evaluation of direct, timely measures with the IT department as well as the management.

Reporting

Written summary of findings including management summary and personal conclusion.

Retest

Re-check positively tested vulnerabilities.

Do you have any questions or would you like a personal consultation?

Monday to Friday from 09:30 to 17:00

+49 6426 8989-020

info@evait.de

We believe in Open Source

In our pentests and daily work, we only use open source and freely available software. From the operating system to reporting tools, we rely on Linux and bleeding-edge versions.

In addition to many published projects, we work very closely with the OSS community, developing and sharing solutions, finding and reporting vulnerabilities in open source software and debugging bugs together with the developers.

From time to time, we also give the public a little insight into our everyday life. Click here for the story ...