Non-binding inquiry
* = Mandatory fields
How Protforce handles your data and what your rights in this context are can be found here
Weak points can occur on several levels and are not exclusively technological. Often, a combination of different pieces of information provides the foundation for an initial compromise.
Protforce actively takes on the role of the attacker.
In this way, we localize technical weaknesses as well as neuralgic points at which the human factor becomes a security risk.
Protforce offers a broad offensive service portfolio ranging from the initial gathering of information to the execution of attack scenarios, which are specifically tailored to the customer.