{"id":24628,"date":"2023-09-28T09:17:30","date_gmt":"2023-09-28T07:17:30","guid":{"rendered":"https:\/\/enginsight.com\/security-audit\/"},"modified":"2026-01-22T09:24:08","modified_gmt":"2026-01-22T08:24:08","slug":"security-audit","status":"publish","type":"page","link":"https:\/\/enginsight.com\/en\/security-audit\/","title":{"rendered":"Security-Audit"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"24628\" class=\"elementor elementor-24628 elementor-12410\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ed65d01 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ed65d01\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77c6203a\" data-id=\"77c6203a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-153c0fa6 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"153c0fa6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-92410de\" data-id=\"92410de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34837902 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"34837902\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tPentesting Security-Audit\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55d0376 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"55d0376\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Cybersecurity <\/span><span class=\"premium-dual-header-second-header \">Risk analysis<\/span><\/h1> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4754ef34 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4754ef34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25bf3400 elementor-widget elementor-widget-text-editor\" data-id=\"25bf3400\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Want to make sure your business is protected against cyberattacks? A security audit is the first step. Our team of experts will thoroughly assess your security measures and identify critical vulnerabilities that leave your organization vulnerable.  <\/p>\n<p>With our recommendations, you can protect yourself and your company&#x2019;s sensitive information and assets &#x2013; invest in a security audit today.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6c2458ae\" data-id=\"6c2458ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-518a204e elementor-widget elementor-widget-image\" data-id=\"518a204e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Frau-NGS-Brille-1-683x1024.png\" class=\"attachment-large size-large wp-image-12646\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Frau-NGS-Brille-1-683x1024.png 683w, https:\/\/enginsight.com\/wp-content\/uploads\/Frau-NGS-Brille-1-200x300.png 200w, https:\/\/enginsight.com\/wp-content\/uploads\/Frau-NGS-Brille-1-768x1152.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/Frau-NGS-Brille-1-1024x1536.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/Frau-NGS-Brille-1.png 1200w\" sizes=\"(max-width: 683px) 100vw, 683px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-10f35e35 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10f35e35\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-296e6165\" data-id=\"296e6165\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-186ac29b elementor-widget elementor-widget-image\" data-id=\"186ac29b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"200\" height=\"61\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/08\/powered-by-Enginsight-1.png\" class=\"attachment-large size-large wp-image-11187\" alt=\"powered-by-Enginsight\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2fb93aaf\" data-id=\"2fb93aaf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d96205b premium-nav-hor premium-nav-none premium-ham-dropdown elementor-widget elementor-widget-premium-nav-menu\" data-id=\"7d96205b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"submenu_icon\":{\"value\":\"fas fa-angle-down\",\"library\":\"fa-solid\"}}' data-widget_type=\"premium-nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div data-settings='{\"breakpoint\":1024,\"mobileLayout\":\"dropdown\",\"mainLayout\":\"hor\",\"stretchDropdown\":false,\"hoverEffect\":\"\",\"submenuEvent\":\"hover\",\"submenuTrigger\":\"item\",\"closeAfterClick\":false,\"renderMobileMenu\":true}' class=\"premium-nav-widget-container premium-nav-pointer-none\" style=\"visibility:hidden; opacity:0;\">\n\t\t\t<div class=\"premium-ver-inner-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"premium-hamburger-toggle premium-mobile-menu-icon\" role=\"button\" aria-label=\"Toggle Menu\">\n\t\t\t\t\t\t<span class=\"premium-toggle-text\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-bars\"><\/i>Menu\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"premium-toggle-close\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-times\"><\/i>Close\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-nav-menu-container\">\n\t\t\t\t\t\t<ul class=\"premium-nav-menu premium-main-nav-menu\">\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<li class=\"premium-item-anchor menu-item premium-nav-menu-item elementor-repeater elementor-repeater-item-e623db5 has-pa-badge\"><a href=\"#warum\" class=\"premium-menu-link premium-menu-link-parent premium-lq__none\">Why a Security Audit?<span class=\"premium-item-badge\">dfh<\/span><\/a><\/li><li class=\"premium-item-anchor menu-item premium-nav-menu-item elementor-repeater elementor-repeater-item-bb8718f\"><a href=\"#was\" class=\"premium-menu-link premium-menu-link-parent premium-lq__none\">What happens there?<\/a><\/li><li class=\"premium-item-anchor menu-item premium-nav-menu-item elementor-repeater elementor-repeater-item-a3870f7\"><a href=\"#wie\" class=\"premium-menu-link premium-menu-link-parent premium-lq__none\">How does it work?<\/a>\t\t\t\t\t\t<\/li><\/ul>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-mobile-menu-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"premium-mobile-menu premium-main-mobile-menu premium-main-nav-menu\">\n\t\t\t\t\t\t\t\t\t<li class=\"premium-item-anchor menu-item premium-nav-menu-item elementor-repeater elementor-repeater-item-e623db5 has-pa-badge\"><a href=\"#warum\" class=\"premium-menu-link premium-menu-link-parent premium-lq__none\">Why a Security Audit?<span class=\"premium-item-badge\">dfh<\/span><\/a><\/li><li class=\"premium-item-anchor menu-item premium-nav-menu-item elementor-repeater elementor-repeater-item-bb8718f\"><a href=\"#was\" class=\"premium-menu-link premium-menu-link-parent premium-lq__none\">What happens there?<\/a><\/li><li class=\"premium-item-anchor menu-item premium-nav-menu-item elementor-repeater elementor-repeater-item-a3870f7\"><a href=\"#wie\" class=\"premium-menu-link premium-menu-link-parent premium-lq__none\">How does it work?<\/a>\t\t\t\t\t\t\t\t<\/li><\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-433ec4f8\" data-id=\"433ec4f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21b636f1 premium-lq__none elementor-widget elementor-widget-premium-addon-button\" data-id=\"21b636f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t<a class=\"premium-button premium-button-style1 premium-btn-lg premium-button-style1-bottom\" href=\"#form\">\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\tRequest price\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/a>\n\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71d37c38 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"71d37c38\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-5e69ae8a\" data-id=\"5e69ae8a\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39d3122a elementor-widget elementor-widget-image\" data-id=\"39d3122a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"345\" height=\"125\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/07\/lvv.png\" class=\"attachment-large size-large wp-image-5808\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/07\/lvv.png 345w, https:\/\/enginsight.com\/wp-content\/uploads\/2020\/07\/lvv-300x109.png 300w\" sizes=\"(max-width: 345px) 100vw, 345px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-6f3d464f\" data-id=\"6f3d464f\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6041c330 elementor-widget elementor-widget-image\" data-id=\"6041c330\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"734\" height=\"554\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/IT-Security-made-in-Germany_TeleTrusT-Seal.png\" class=\"attachment-large size-large wp-image-10194\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-52c9d46c\" data-id=\"52c9d46c\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39042324 elementor-widget elementor-widget-image\" data-id=\"39042324\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"83\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2021\/09\/Logo_Teilnehmer_Web-200x83xc.png\" class=\"attachment-large size-large wp-image-9141\" alt=\"Allianz_fuer_Cybersicherheit_Enginsight\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-2b7dba78\" data-id=\"2b7dba78\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e93a1c7 elementor-widget elementor-widget-image\" data-id=\"2e93a1c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"414\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/tuev-WEISS.png\" class=\"attachment-large size-large wp-image-10196\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-5e5206de\" data-id=\"5e5206de\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6296f33c elementor-widget elementor-widget-image\" data-id=\"6296f33c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"150\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/02\/jenoptik.png\" class=\"attachment-large size-large wp-image-5183\" alt=\"Jenoptik\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dcaa1b4 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"dcaa1b4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-77fcf18e\" data-id=\"77fcf18e\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1026f61 elementor-widget elementor-widget-image\" data-id=\"1026f61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"150\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/02\/hanse.png\" class=\"attachment-large size-large wp-image-5181\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-4bb3f826\" data-id=\"4bb3f826\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b3015d3 elementor-widget elementor-widget-image\" data-id=\"3b3015d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"136\" height=\"102\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/HSV_sw.png\" class=\"attachment-large size-large wp-image-15536\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-f2007a5\" data-id=\"f2007a5\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d54e02 elementor-widget elementor-widget-image\" data-id=\"1d54e02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"112\" height=\"46\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/HDI_sw.png\" class=\"attachment-large size-large wp-image-15538\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-29d79e1d\" data-id=\"29d79e1d\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da2b213 elementor-widget elementor-widget-image\" data-id=\"da2b213\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"132\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-1024x169.png\" class=\"attachment-large size-large wp-image-15540\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-1024x169.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-300x50.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-768x127.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw.png 1517w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-4c26dc1\" data-id=\"4c26dc1\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1755e744 elementor-widget elementor-widget-image\" data-id=\"1755e744\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"121\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/ZapfCreation-sw-1.png\" class=\"attachment-large size-large wp-image-15544\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-19135b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"19135b0\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a3b3ff5\" data-id=\"a3b3ff5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-04bd705 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"04bd705\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4d96894\" data-id=\"4d96894\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ffa225b elementor-widget elementor-widget-menu-anchor\" data-id=\"ffa225b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"why\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83912d9 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"83912d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tsystematic security assessment of your IT\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31561bf premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"31561bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Why do I need <\/span><span class=\"premium-dual-header-second-header \">a security audit?<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f6f057 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0f6f057\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3212758 elementor-widget elementor-widget-text-editor\" data-id=\"3212758\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A security audit is a systematic assessment of the security of an organization&#x2019;s information systems and processes. The purpose of a security audit is to identify vulnerabilities in the system and recommend actions to address those issues and improve the overall security of the system. <\/p>\n<p>IT security audits are an important part of maintaining the <strong>confidentiality, integrity and availability of an organization&#x2019;s information and systems<\/strong>.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-eca7245\" data-id=\"eca7245\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80122f2 elementor-widget elementor-widget-image\" data-id=\"80122f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"618\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2021\/09\/Audit_Statisik.png\" class=\"attachment-large size-large wp-image-9221\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f061928 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f061928\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-473e3f5\" data-id=\"473e3f5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-af6a0a2 elementor-widget elementor-widget-icon-box\" data-id=\"af6a0a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\tTransparency \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCan you measure your IT security and really know what's going on? Create the transparency you need through the lens of a hacker. This allows you to immediately identify the neuralgic points of your IT.  \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4b0ffa7\" data-id=\"4b0ffa7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22a88ab elementor-widget elementor-widget-icon-box\" data-id=\"22a88ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\tCompliance\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tMeet the regulatory requirements of a wide range of standards, e.g. ISO 27001, TISAX, B3S, BAIT, VAIT, with an Enginsight security audit or penetration test, etc.  \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e8d2050\" data-id=\"e8d2050\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7785157 elementor-widget elementor-widget-icon-box\" data-id=\"7785157\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\tObjectivity\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tThe objective view of the pentest gives you insight into whether your current attack detection measures are working, beyond the report of your security vulnerabilities.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-59a9add premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"59a9add\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tBEST OF: Risks identified\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58ee231 elementor--h-position-center elementor--v-position-middle elementor-arrows-position-inside elementor-pagination-position-inside elementor-widget elementor-widget-slides\" data-id=\"58ee231\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"autoplay_speed\":80000,\"navigation\":\"both\",\"autoplay\":\"yes\",\"pause_on_hover\":\"yes\",\"pause_on_interaction\":\"yes\",\"infinite\":\"yes\",\"transition\":\"slide\",\"transition_speed\":500}' data-widget_type=\"slides.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"fadeInRight\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-dc2d0f2 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\"><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">City administration<\/div><div class=\"elementor-slide-description\"><p>Obsolete ISDN converter for intercom and door, which had access to the Internet.<\/p>\n<\/div><div class=\"elementor-button elementor-slide-button elementor-size-sm\">Door could be opened by anyone on the Internet.<\/div><\/div><\/div><\/div><div class=\"elementor-repeater-item-43db6d8 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\"><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">Medical school<\/div><div class=\"elementor-slide-description\"><p>Routing 100+ VLANs through the router and open NAS systems with research data.<\/p>\n<\/div><div class=\"elementor-button elementor-slide-button elementor-size-sm\">Access to med research data was available to every student and guest.<\/div><\/div><\/div><\/div><div class=\"elementor-repeater-item-56589f9 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\"><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">Financial services provider<\/div><div class=\"elementor-slide-description\"><p>User passwords stored in AD notes and printer with domain admin rights<\/p>\n<\/div><div class=\"elementor-button elementor-slide-button elementor-size-sm\">Anyone with access to the printer could view and control all files and services.<\/div><\/div><\/div><\/div><div class=\"elementor-repeater-item-30f5a84 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\"><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">Energy provider<\/div><div class=\"elementor-slide-description\"><p>System control no longer AirGap secured and accessible from outside due to connected headset<\/p>\n<\/div><div class=\"elementor-button elementor-slide-button elementor-size-sm\">Plant control and cooling system was accessible and very vulnerable with Windows XP.<\/div><\/div><\/div><\/div><div class=\"elementor-repeater-item-efc8331 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\"><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">Nursing service<\/div><div class=\"elementor-slide-description\"><p>Main building surveillance camera established an open S2S VPN to the security company <\/p>\n<\/div><div class=\"elementor-button elementor-slide-button elementor-size-sm\">From the care service could be spied uncontrolled on many other properties (&gt;200 cameras) e.g. car dealerships, hospitals, stadiums and much more.<\/div><\/div><\/div><\/div><div class=\"elementor-repeater-item-bc462ac swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\"><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">IT service provider<\/div><div class=\"elementor-slide-description\"><p>After an administrator left, the firewall was completely disabled and ignored all data flow via any any rule.<\/p>\n<\/div><div class=\"elementor-button elementor-slide-button elementor-size-sm\">Data traffic was completely uncontrolled and could be attacked at will from the outside.<\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Previous slide\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-left\"><\/i>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Next slide\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-right\"><\/i>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c0ad9fc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c0ad9fc\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6019b2b\" data-id=\"6019b2b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-090d51f elementor-widget elementor-widget-menu-anchor\" data-id=\"090d51f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"what\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0b7de15 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b7de15\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e0a9671\" data-id=\"e0a9671\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f7626c premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"8f7626c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tPenetration testing and vulnerability analysis\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5303227 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"5303227\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">What happens <\/span><span class=\"premium-dual-header-second-header \">during a security audit?<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdb5684 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fdb5684\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15cc317 elementor-widget elementor-widget-text-editor\" data-id=\"15cc317\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Only those who have everything in view can really assess their own risk and make concrete<br>take measures. With the help of the Enginsight platform in combination with many years of security \/ pentest know-how, we analyze the security status of your IT, show you all the security gaps that have been uncovered in a meaningful report and discuss further recommendations for action with you. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-91b786f\" data-id=\"91b786f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5128e5a elementor-widget elementor-widget-image\" data-id=\"5128e5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"143\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/IT-Security-made-in-Germany_TeleTrusT-Seal-250.gif\" class=\"attachment-large size-large wp-image-15110\" alt=\"IT Security Made in Germany Teletrust Siegel\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a80b5e premium-tabs-icon-row elementor-widget elementor-widget-premium-addon-tabs\" data-id=\"4a80b5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_tabs_repeater&quot;:[{&quot;_id&quot;:&quot;9047a91&quot;,&quot;premium_tabs_title&quot;:&quot;(Hidden) Data Discovery &amp; Information Leakage&quot;,&quot;premium_tabs_content_temp&quot;:null,&quot;lottie_url&quot;:null,&quot;icon_type&quot;:null,&quot;image_upload&quot;:null,&quot;premium_tabs_content_text&quot;:&quot;&lt;ul&gt;&lt;li&gt;Finding potential public and hidden information channels&lt;\\\/li&gt;&lt;li&gt;Startpoint of Lateral Movement&lt;\\\/li&gt;&lt;li&gt;Information Gathering and Vulnerability Identification&lt;\\\/li&gt;&lt;li&gt;Sensitive Information Breach (Where can internal data leak)&lt;\\\/li&gt;&lt;li&gt;Detection of non-publicly visible files e.g. DB dumb, password files, password dumb in root folder, which was downloadable&lt;\\\/li&gt;&lt;\\\/ul&gt;&lt;p&gt;The information gathered about the system (Information Gathering) will be used to tailor &lt;b&gt;Enginsight&lt;\\\/b&gt; to your system to execute the appropriate attack vectors and immensely reduce the false positive rate to expose vulnerabilities. &lt;\\\/p&gt;&quot;,&quot;index&quot;:0,&quot;premium_tabs_icon_switcher&quot;:&quot;&quot;,&quot;premium_tabs_icon_updated&quot;:null,&quot;custom_svg&quot;:null,&quot;draw_svg&quot;:null,&quot;svg_sync&quot;:null,&quot;frames&quot;:null,&quot;lottie_loop&quot;:null,&quot;lottie_reverse&quot;:null,&quot;start_point&quot;:null,&quot;end_point&quot;:null,&quot;svg_hover&quot;:null,&quot;svg_yoyo&quot;:null,&quot;svg_color&quot;:null,&quot;premium_tabs_content&quot;:&quot;text_editor&quot;,&quot;container_id&quot;:null,&quot;live_temp_content&quot;:null,&quot;custom_tab_navigation&quot;:&quot;&quot;,&quot;path_width&quot;:null},{&quot;premium_tabs_title&quot;:&quot;Vulnerabilities from 3 perspectives&quot;,&quot;_id&quot;:&quot;a54cc22&quot;,&quot;lottie_url&quot;:null,&quot;premium_tabs_content_temp&quot;:null,&quot;image_upload&quot;:null,&quot;premium_tabs_content_text&quot;:&quot;&lt;p&gt;During the security audit, we validate the vulnerabilities and potential entry points from three angles: &lt;\\\/p&gt;&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Black-Box&lt;\\\/strong&gt;- analysis from the outside on your web applications (web security analysis)&lt;\\\/li&gt;&lt;li&gt;&lt;strong&gt;Grey-Box&lt;\\\/strong&gt;-analysis from the outside through the glasses of an attacker (authenticated or non-authenticated). Targets are everything that has an IP address, e.g. servers, clients, websites, Fritzbox, Active Directory, IoT devices, etc.   &lt;\\\/li&gt;&lt;li&gt;&lt;strong&gt;White-Box-&lt;\\\/strong&gt;analysis directly on your Windows or Linux server and clients incl. directly possible countermeasures (patching and mitigation \\\/ CWE). &lt;\\\/li&gt;&lt;\\\/ol&gt;&quot;,&quot;index&quot;:1,&quot;premium_tabs_icon_switcher&quot;:&quot;&quot;,&quot;icon_type&quot;:null,&quot;premium_tabs_icon_updated&quot;:null,&quot;custom_svg&quot;:null,&quot;draw_svg&quot;:null,&quot;svg_sync&quot;:null,&quot;frames&quot;:null,&quot;lottie_loop&quot;:null,&quot;lottie_reverse&quot;:null,&quot;start_point&quot;:null,&quot;end_point&quot;:null,&quot;svg_hover&quot;:null,&quot;svg_yoyo&quot;:null,&quot;svg_color&quot;:null,&quot;premium_tabs_content&quot;:&quot;text_editor&quot;,&quot;container_id&quot;:null,&quot;live_temp_content&quot;:null,&quot;custom_tab_navigation&quot;:&quot;&quot;,&quot;path_width&quot;:null},{&quot;premium_tabs_title&quot;:&quot;Insider Attacks on your Infrastructure&quot;,&quot;_id&quot;:&quot;e72398f&quot;,&quot;lottie_url&quot;:null,&quot;premium_tabs_content_temp&quot;:null,&quot;image_upload&quot;:null,&quot;premium_tabs_content_text&quot;:&quot;&lt;ul&gt;&lt;li&gt;Finding incorrect configurations that lead to potential vulnerabilities&lt;\\\/li&gt;&lt;li&gt;Highlight vulnerable points where an attacker can take control of your systems&lt;\\\/li&gt;&lt;li&gt;Gathering critical information that is exploited by attackers&lt;\\\/li&gt;&lt;li&gt;Verification of the trustworthiness of your communication \\\/ protection against identity theft&lt;\\\/li&gt;&lt;li&gt;Active Directory scanning to see if important company information can be found without Auth&lt;\\\/li&gt;&lt;\\\/ul&gt;&quot;,&quot;index&quot;:2,&quot;premium_tabs_icon_switcher&quot;:&quot;&quot;,&quot;icon_type&quot;:null,&quot;premium_tabs_icon_updated&quot;:null,&quot;custom_svg&quot;:null,&quot;draw_svg&quot;:null,&quot;svg_sync&quot;:null,&quot;frames&quot;:null,&quot;lottie_loop&quot;:null,&quot;lottie_reverse&quot;:null,&quot;start_point&quot;:null,&quot;end_point&quot;:null,&quot;svg_hover&quot;:null,&quot;svg_yoyo&quot;:null,&quot;svg_color&quot;:null,&quot;premium_tabs_content&quot;:&quot;text_editor&quot;,&quot;container_id&quot;:null,&quot;live_temp_content&quot;:null,&quot;custom_tab_navigation&quot;:&quot;&quot;,&quot;path_width&quot;:null},{&quot;premium_tabs_title&quot;:&quot;Intrusion Detection&quot;,&quot;_id&quot;:&quot;9149f36&quot;,&quot;lottie_url&quot;:null,&quot;premium_tabs_content_temp&quot;:null,&quot;image_upload&quot;:null,&quot;premium_tabs_content_text&quot;:&quot;&lt;p&gt;Detect anomalies, attacks or existing hackers through Enginsight's host-based intrusion detection system, right live on your endpoint. &lt;\\\/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Protection against unknown threats: A HIDS uses rules or signature patterns to identify threats that are known, but also the ability to detect anomalies that may indicate possible threats.&lt;\\\/p&gt;&lt;\\\/li&gt;&lt;li&gt;&lt;p&gt;Insider threat detection: A HIDS can help detect insider threats by monitoring user and process activity on the system and detecting anomalies that may indicate potential threats.&lt;\\\/p&gt;&lt;\\\/li&gt;&lt;li&gt;&lt;p&gt;Complementing network security tools: A HIDS can be used to complement network security tools such as firewalls and network intrusion detection systems (NIDS) to provide a comprehensive security solution.&lt;\\\/p&gt;&lt;\\\/li&gt;&lt;\\\/ul&gt;&quot;,&quot;index&quot;:3,&quot;premium_tabs_icon_switcher&quot;:&quot;&quot;,&quot;icon_type&quot;:null,&quot;premium_tabs_icon_updated&quot;:null,&quot;custom_svg&quot;:null,&quot;draw_svg&quot;:null,&quot;svg_sync&quot;:null,&quot;frames&quot;:null,&quot;lottie_loop&quot;:null,&quot;lottie_reverse&quot;:null,&quot;start_point&quot;:null,&quot;end_point&quot;:null,&quot;svg_hover&quot;:null,&quot;svg_yoyo&quot;:null,&quot;svg_color&quot;:null,&quot;premium_tabs_content&quot;:&quot;text_editor&quot;,&quot;container_id&quot;:null,&quot;live_temp_content&quot;:null,&quot;custom_tab_navigation&quot;:&quot;&quot;,&quot;path_width&quot;:null}],&quot;premium_tab_style_selected&quot;:&quot;style3&quot;,&quot;premium_tab_active_background_color&quot;:&quot;#E91E63&quot;,&quot;accordion_tabs&quot;:&quot;true&quot;,&quot;accordion_tabs_devices&quot;:[&quot;mobile&quot;],&quot;premium_tab_background_color&quot;:&quot;#FFFFFF00&quot;,&quot;default_tab_index&quot;:0,&quot;premium_tab_type&quot;:&quot;horizontal&quot;,&quot;accordion_animation&quot;:&quot;yes&quot;,&quot;accordion_tabs_anim_duration&quot;:&quot;fast&quot;}\" data-widget_type=\"premium-addon-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t&#13;\n\t\t\t<div data-navigation='[\"\",\"\",\"\",\"\"]' id=\"premium-tabs-4a80b5e\" class=\"premium-tabs premium-tabs-style-flip premium-tabs-horizontal\">&#13;\n\t\t\t\t<div class=\"premium-tabs-nav horizontal\">&#13;\n\t\t\t\t\t<ul class=\"premium-tabs-nav-list premium-tabs-horizontal\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-9047a91\" data-list-index=\"0\" data-content-id=\"#premium-accordion-content-0\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-0-4a80b5e\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">\n\t\t\t\t\t\t\t\t\t\t\t(Hidden) Data Discovery &amp; Information Leakage\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-0\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-0-4a80b5e\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul><li>Finding potential public and hidden information channels<\/li><li>Startpoint of Lateral Movement<\/li><li>Information Gathering and Vulnerability Identification<\/li><li>Sensitive Information Breach (Where can internal data leak)<\/li><li>Detection of non-publicly visible files e.g. DB dumb, password files, password dumb in root folder, which was downloadable<\/li><\/ul><p>The information gathered about the system (Information Gathering) will be used to tailor <b>Enginsight<\/b> to your system to execute the appropriate attack vectors and immensely reduce the false positive rate to expose vulnerabilities. <\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-a54cc22\" data-list-index=\"1\" data-content-id=\"#premium-accordion-content-1\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-1-4a80b5e\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tVulnerabilities from 3 perspectives\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-1\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-1-4a80b5e\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>During the security audit, we validate the vulnerabilities and potential entry points from three angles: <\/p><ol><li><strong>Black-Box<\/strong>&#x2013; analysis from the outside on your web applications (web security analysis)<\/li><li><strong>Grey-Box<\/strong>-analysis from the outside through the glasses of an attacker (authenticated or non-authenticated). Targets are everything that has an IP address, e.g. servers, clients, websites, Fritzbox, Active Directory, IoT devices, etc.   <\/li><li><strong>White-Box-<\/strong>analysis directly on your Windows or Linux server and clients incl. directly possible countermeasures (patching and mitigation \/ CWE). <\/li><\/ol>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-e72398f\" data-list-index=\"2\" data-content-id=\"#premium-accordion-content-2\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-2-4a80b5e\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tInsider Attacks on your Infrastructure\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-2\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-2-4a80b5e\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul><li>Finding incorrect configurations that lead to potential vulnerabilities<\/li><li>Highlight vulnerable points where an attacker can take control of your systems<\/li><li>Gathering critical information that is exploited by attackers<\/li><li>Verification of the trustworthiness of your communication \/ protection against identity theft<\/li><li>Active Directory scanning to see if important company information can be found without Auth<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-9149f36\" data-list-index=\"3\" data-content-id=\"#premium-accordion-content-3\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-3-4a80b5e\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tIntrusion Detection\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-3\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-3-4a80b5e\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Detect anomalies, attacks or existing hackers through Enginsight&#x2019;s host-based intrusion detection system, right live on your endpoint. <\/p><ul><li><p>Protection against unknown threats: A HIDS uses rules or signature patterns to identify threats that are known, but also the ability to detect anomalies that may indicate possible threats.<\/p><\/li><li><p>Insider threat detection: A HIDS can help detect insider threats by monitoring user and process activity on the system and detecting anomalies that may indicate potential threats.<\/p><\/li><li><p>Complementing network security tools: A HIDS can be used to complement network security tools such as firewalls and network intrusion detection systems (NIDS) to provide a comprehensive security solution.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>&#13;\n\t\t\t\t<\/div>&#13;\n&#13;\n\t\t\t\t<div class=\"premium-content-wrap premium-tabs-horizontal\">&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-0-4a80b5e\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul><li>Finding potential public and hidden information channels<\/li><li>Startpoint of Lateral Movement<\/li><li>Information Gathering and Vulnerability Identification<\/li><li>Sensitive Information Breach (Where can internal data leak)<\/li><li>Detection of non-publicly visible files e.g. DB dumb, password files, password dumb in root folder, which was downloadable<\/li><\/ul><p>The information gathered about the system (Information Gathering) will be used to tailor <b>Enginsight<\/b> to your system to execute the appropriate attack vectors and immensely reduce the false positive rate to expose vulnerabilities. <\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-1-4a80b5e\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>During the security audit, we validate the vulnerabilities and potential entry points from three angles: <\/p><ol><li><strong>Black-Box<\/strong>&#x2013; analysis from the outside on your web applications (web security analysis)<\/li><li><strong>Grey-Box<\/strong>-analysis from the outside through the glasses of an attacker (authenticated or non-authenticated). Targets are everything that has an IP address, e.g. servers, clients, websites, Fritzbox, Active Directory, IoT devices, etc.   <\/li><li><strong>White-Box-<\/strong>analysis directly on your Windows or Linux server and clients incl. directly possible countermeasures (patching and mitigation \/ CWE). <\/li><\/ol>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-2-4a80b5e\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul><li>Finding incorrect configurations that lead to potential vulnerabilities<\/li><li>Highlight vulnerable points where an attacker can take control of your systems<\/li><li>Gathering critical information that is exploited by attackers<\/li><li>Verification of the trustworthiness of your communication \/ protection against identity theft<\/li><li>Active Directory scanning to see if important company information can be found without Auth<\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-3-4a80b5e\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Detect anomalies, attacks or existing hackers through Enginsight&#x2019;s host-based intrusion detection system, right live on your endpoint. <\/p><ul><li><p>Protection against unknown threats: A HIDS uses rules or signature patterns to identify threats that are known, but also the ability to detect anomalies that may indicate possible threats.<\/p><\/li><li><p>Insider threat detection: A HIDS can help detect insider threats by monitoring user and process activity on the system and detecting anomalies that may indicate potential threats.<\/p><\/li><li><p>Complementing network security tools: A HIDS can be used to complement network security tools such as firewalls and network intrusion detection systems (NIDS) to provide a comprehensive security solution.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t<\/div>&#13;\n&#13;\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-72f0f8cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"72f0f8cb\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"gradient\",\"shape_divider_top\":\"waves\"}'>\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\n\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\n\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"><\/path>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70e8bacf\" data-id=\"70e8bacf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9affee9 elementor-widget elementor-widget-menu-anchor\" data-id=\"9affee9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"how\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2a34818f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a34818f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-75374289\" data-id=\"75374289\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22a4446 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"22a4446\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tCreating security together\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2117a6c premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"2117a6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">What do I have to do, <\/span><span class=\"premium-dual-header-second-header \">to protect my IT?<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2966384a elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2966384a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-3d4f4803\" data-id=\"3d4f4803\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ba27411 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"4ba27411\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style1\">\n\t\t\t<div class=\"premium-title-header premium-title-style1\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tThe process\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-262e140a elementor-widget elementor-widget-text-editor\" data-id=\"262e140a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As part of the IT security audit, we analyze your IT environment together with you and advise you on the points that are important to you.<\/p>\n<p>We provide you with the Enginsight application environment in your data center (or alternatively as SaaS) and place the necessary software sensors.<\/p>\n<p>We actively involve you and concretize first quick wins to increase your security level.<\/p>\n<p>We evaluate and interpret the vulnerabilities and incidents we find and, in the best case scenario, resolve them directly with your IT.<\/p>\n<p>In this way, we enable you to ensure an optimal level of security for your services and systems<br>and thus effectively protect yourself from damage caused by cybercrime.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cf4aa0 premium-lq__none elementor-widget elementor-widget-premium-addon-button\" data-id=\"3cf4aa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t<a class=\"premium-button premium-button-style1 premium-btn-lg premium-button-style1-bottom\" href=\"https:\/\/enginsight.com\/en\/event\/it-security-compliance-in-the-pharmaceutical-industry-and-healthcare\/beispiel-audit-enginsight\/\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\tDemo Report download\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/a>\n\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-444bda4c\" data-id=\"444bda4c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7cd754 elementor-widget elementor-widget-image\" data-id=\"b7cd754\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"1024\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/security-audit-process-middle-644x1024.png\" class=\"attachment-large size-large wp-image-15466\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/security-audit-process-middle-644x1024.png 644w, https:\/\/enginsight.com\/wp-content\/uploads\/security-audit-process-middle-189x300.png 189w, https:\/\/enginsight.com\/wp-content\/uploads\/security-audit-process-middle-768x1222.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/security-audit-process-middle.png 904w\" sizes=\"(max-width: 644px) 100vw, 644px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-23bd218\" data-id=\"23bd218\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67f0c012 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"67f0c012\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style1\">\n\t\t\t<div class=\"premium-title-header premium-title-style1\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tOrganizational\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b664aa5 elementor-widget elementor-widget-text-editor\" data-id=\"b664aa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Initial analysis of your current security status in a personal preliminary meeting with one of our security experts and definition of the test set.<\/p>\n<p>Setting up Enginsight software in your IT environment.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28ac627e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"28ac627e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31bfe0ec premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"31bfe0ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style1\">\n\t\t\t<div class=\"premium-title-header premium-title-style1\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tExecution\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e03189e premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"5e03189e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"rbadges_repeater\":[]}' data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\n\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-b448df2\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon premium-svg-drawer elementor-invisible\" data-svg-reverse=\"\" data-svg-loop=\"true\" data-svg-hover=\"\" data-svg-sync=\"\" data-svg-fill=\"\" data-svg-frames=\"5\" data-svg-yoyo=\"\" data-svg-point=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"Surface and depth scans\"> Surface and depth scans <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-ee2c7ef\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon premium-svg-drawer elementor-invisible\" data-svg-reverse=\"\" data-svg-loop=\"true\" data-svg-hover=\"\" data-svg-sync=\"\" data-svg-fill=\"\" data-svg-frames=\"5\" data-svg-yoyo=\"\" data-svg-point=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"Vulnerability scan\"> Vulnerability scan <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-afe6777\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon premium-svg-drawer elementor-invisible\" data-svg-reverse=\"\" data-svg-loop=\"true\" data-svg-hover=\"\" data-svg-sync=\"\" data-svg-fill=\"\" data-svg-frames=\"5\" data-svg-yoyo=\"\" data-svg-point=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"Intrusion Detection\"> Intrusion Detection <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-f075c2d\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon premium-svg-drawer elementor-invisible\" data-svg-reverse=\"\" data-svg-loop=\"true\" data-svg-hover=\"\" data-svg-sync=\"\" data-svg-fill=\"\" data-svg-frames=\"5\" data-svg-yoyo=\"\" data-svg-point=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"Attack simulation\"> Attack simulation <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-ccf6204\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon premium-svg-drawer elementor-invisible\" data-svg-reverse=\"\" data-svg-loop=\"true\" data-svg-hover=\"\" data-svg-sync=\"\" data-svg-fill=\"\" data-svg-frames=\"5\" data-svg-yoyo=\"\" data-svg-point=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"Actual state analysis\"> Actual state analysis <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c371c2f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6c371c2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c06119 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"5c06119\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style1\">\n\t\t\t<div class=\"premium-title-header premium-title-style1\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tReporting\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f86469 elementor-widget elementor-widget-text-editor\" data-id=\"8f86469\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Recommend actions &amp; debrief to derive actions and plan optimization points.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d31400c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d31400c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21c1dad\" data-id=\"21c1dad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ad0a340 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"ad0a340\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tPentesting Security-Audit\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a94ffe2 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"a94ffe2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Your Audit  <\/span><span class=\"premium-dual-header-second-header \">request offer<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63e7ff5 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"63e7ff5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automated pentest<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automated vulnerability analysis<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Asset inventory as a basis for penetration testing<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-secret\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Information gathering from a hacker's point of view<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-secret\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Password check with brute force<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-secret\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Specific attacks on detected services<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-secret\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Web-based attacks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-secret\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Network vulnerability scan (CVE scan)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-secret\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Extend attacks through custom scripts <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Clear risk assessment<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Concrete recommendations for action<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b9e81e9\" data-id=\"b9e81e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c8d7b9c elementor-widget elementor-widget-menu-anchor\" data-id=\"c8d7b9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"form\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2f926f elementor-widget elementor-widget-html\" data-id=\"d2f926f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    portalId: \"143253842\",\n    formId: \"7cf4d52a-b983-4989-90e0-2833b5c0b440\",\n    region: \"eu1\"\n  });\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40b6250 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"40b6250\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f3ac44c\" data-id=\"f3ac44c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9785a8 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"c9785a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_mobile&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<h2 class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tSecurity Audit FAQ \t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/h2>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b630171 elementor-widget elementor-widget-toggle\" data-id=\"b630171\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1911\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1911\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How long does the security audit take?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1911\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1911\"><p>Enginsight&#8217;s classic security audit covers a maximum of 4 x 24 networks and can be carried out in one working day. For larger environments, we discuss the effort estimate with you individually. If you have specific requirements for the penetration test, this may also affect the runtime.   <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1912\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1912\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What does a security audit cost?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1912\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1912\"><p>The classic Enginsight Security Audit for max. 4 x 24 nets costs approx. 5.000,- Euro. After a first preliminary discussion you will receive an individual offer.  <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1913\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1913\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Who performs the audits?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1913\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1913\"><p>The security audit \/ penetration test is performed by security experts of Enginsight GmbH or by qualified partners (IT service providers).<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1914\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1914\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Does the audit affect my current operation?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1914\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1914\"><p>Normally not, as we have developed a gentler method than burdening your systems with highly invasive exploits. Failure could occur in the following cases: The target\/machine is already running at 99% load and\/or is so poorly configured that any PING will cause the device to fail. However, this would also be a good finding in the context of penetration testing.  <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1915\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1915\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Which devices can be tested?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1915\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1915\"><p>Everything that can be reached via an IP. This includes in general: server, client, websites, Fritzboxes, databases, web applications, Active Directory and many more.  <\/p>\n<p>If we encounter something &#8220;new&#8221; at your site, we can also offer possible tests here after consulting with you.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1916\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1916\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How will the audit be followed up?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1916\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1916\"><p>Our security audit provides you with clear and actionable recommendations for action and status analyses, enabling informed decisions to be made at management level as well. <\/p>\n<p>You can then decide whether you want to\/can implement the recommendations directly yourself or have an Enginsight partner do it for you.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1917\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1917\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How often should a security audit be performed?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1917\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1917\"><p>Enginsight Security Audits can be performed by you or an Enginsight partner on a regular basis after customized training. It is most useful to do a check every time something has been changed in your IT.  <\/p>\n<p>If you use Enginsight as a permanent security software, the system automatically performs security checks in the background and alerts you in case of an attack or prevents it proactively.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"How long does the security audit take?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Enginsight&#8217;s classic security audit covers a maximum of 4 x 24 networks and can be carried out in one working day. For larger environments, we discuss the effort estimate with you individually. If you have specific requirements for the penetration test, this may also affect the runtime.   <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"What does a security audit cost?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>The classic Enginsight Security Audit for max. 4 x 24 nets costs approx. 5.000,- Euro. After a first preliminary discussion you will receive an individual offer.  <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Who performs the audits?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>The security audit \\\/ penetration test is performed by security experts of Enginsight GmbH or by qualified partners (IT service providers).<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Does the audit affect my current operation?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Normally not, as we have developed a gentler method than burdening your systems with highly invasive exploits. Failure could occur in the following cases: The target\\\/machine is already running at 99% load and\\\/or is so poorly configured that any PING will cause the device to fail. However, this would also be a good finding in the context of penetration testing.  <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Which devices can be tested?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Everything that can be reached via an IP. This includes in general: server, client, websites, Fritzboxes, databases, web applications, Active Directory and many more.  <\\\/p>\\n<p>If we encounter something &#8220;new&#8221; at your site, we can also offer possible tests here after consulting with you.<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"How will the audit be followed up?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Our security audit provides you with clear and actionable recommendations for action and status analyses, enabling informed decisions to be made at management level as well. <\\\/p>\\n<p>You can then decide whether you want to\\\/can implement the recommendations directly yourself or have an Enginsight partner do it for you.<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"How often should a security audit be performed?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Enginsight Security Audits can be performed by you or an Enginsight partner on a regular basis after customized training. It is most useful to do a check every time something has been changed in your IT.  <\\\/p>\\n<p>If you use Enginsight as a permanent security software, the system automatically performs security checks in the background and alerts you in case of an attack or prevents it proactively.<\\\/p>\\n\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/section><\/div>\n\t\t\n\t\t\t\t\n\t\t","protected":false},"excerpt":{"rendered":"<p>Pentesting Security-Audit Cybersecurity Risk analysis Want to make sure your business is protected against cyberattacks? A security audit is the first step. Our team of experts will thoroughly assess your security measures and identify critical vulnerabilities that leave your organization vulnerable. With our recommendations, you can protect yourself and your company&#x2019;s sensitive information and assets [&#x2026;]<\/p>\n","protected":false},"author":8,"featured_media":13198,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_eb_attr":"","footnotes":""},"class_list":["post-24628","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/24628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/comments?post=24628"}],"version-history":[{"count":3,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/24628\/revisions"}],"predecessor-version":[{"id":36712,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/24628\/revisions\/36712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/media\/13198"}],"wp:attachment":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/media?parent=24628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}