Penetration Testing

Woman pointing with a pen on a screen

Penetration Testing

Penetration testing, or pentest, is an assessment used to evaluate and improve the security of systems (hardware and software), networks, and applications. It is a systematic and repeatable process for identifying and assessing cyber vulnerability, thereby gaining the insights required to develop and prioritise suitable risk mitigation activities.

  • Assurance that your technology is secure, and/or tailored remediation plans addressing any found vulnerabilities 
  • Measurable security improvements tailored to your organisation’s needs, and the added benefit of metrics that can be reported to stakeholders such as the Board of Directors 
  • Support and strategic alignment to improve 

Prevent Data Breaches with Pentesting 

Test your products, systems, apps, offices, data centers, and IT/cloud infrastructure for security vulnerabilities before the attacker does. We test your (or your vendor’s) ability to prevent, detect, respond, and recover from advanced cyber attacks to enhance your organisation’s resilience. 

Key Vaulable Aspects

  • Vulnerability Identification: Pinpoints weaknesses before hackers exploit them 
  • Risk Reduction: Mitigates security risks and potential data breaches 
  • Compliance Assurance: Helps meet regulatory requirements such as NIS2 and DORA
  • Security Awareness: Educates employees on security threats and best practices 
  • Incident Response Improvement: Tests response procedures and enhances readiness 
  • Reputation Protection: Demonstrates commitment to security and preserves trust 
  • Cost-Efficiency: Prevents financial losses associated with breaches 
  • Competitive Edge: Differentiates businesses by showcasing strong security measures 
  • Fulfill Stakeholder Expectations: Demonstrate that your technology is ready for prime time and has been thoroughly battle-tested and evaluated 
  • GDPR risk reduction: Identify privacy issues before they become a legal headache 

Our Pentest Services

Our experienced penetration testers can test the security of any technology. But the most common types of tests are: 

Laptop screen

API Penetration Test

The penetration test of web services checks security in services that are based on protocols such as SOAP/XML and REST. The process involves a complete analysis of the web service to find any weaknesses, technical flaws or vulnerabilities in logic or code.  

Hands in front of screen

Web application penetration test

Our penetration test of web application checks security in a web application such as CMSs, ERP systems, control interfaces and web infrastructure. 

SCADA/ICS (Industrial Control Systems) and OT (Operating Technology) penetration test

Physical security penetration test

The penetration test of SCADA/ICS will provide customer verification of the security in and around systems that control automated processes.

Our physical penetration test will check the completeness and effectiveness of physical security controls implemented by a company, and possibly associated third parties, to protect their facilities and assets.

Someone holding in a mobile phone

Mobile applications

A security review of mobile application checks security in applications that runs on top of mobile OS’s such as Android, iOS and Windows phone. The process involves dynamic analysis and testing of the application to find any weaknesses, technical flaws or vulnerabilities in logic or code. Static analysis may also be conducted depending on programming language, platform and scope/time.

Network penetration test

Can be performed from an external perspective (from the internet) or assuming breach from a corporate laptop or server. The test consists of scanning your infrastructure for vulnerabilities and analyzing and linking these to potential form exploitation chains enabling us to penetrate your network. Assuming breach, we focus on maintaining and extending our persistence on the network, targeting directory services such as (Azure) Active Directory. 

Red team test

Strictly speaking not a penetration test. The red team test will simulate a cyber-attack that will test the company’s ability to resist, detect and possibly handle realistic and relevant attacks. The process involves the preparation and implementation of scenarios. The result of such a test will give business an indication of how exposed their IT systems are and their ability to detect and react to attacks. A red team test can be performed as a TLPT (Threat Lead Penetration Test) to fulfill regulations such as DORA or based on the TIBER framework. 

Trusted Penetration Testing Experts  

  • Our consultants have performed hundreds of tests and are all experienced consultants​  
  • We don’t report automatic or unverified vulnerabilities, saving you the cost of fixing non-vulnerabilities 
  • We are highly technically qualified and certified​, and contribute to responsible disclosure and bug bounty programs 
  • We deliver superior quality in project execution, reporting and follow-up support​  
  • We are agile and support flexible delivery models tailored to our clients’ needs​  
  • We drive real and measurable cyber security improvement  

Pentest Contact Sweden

Leif Johnson


Pentest Contact Norway

André Lima

Senior Manager

Penetration Testing Contact Finland

Tomi Marttinen

Director, Cyber & Digital Risk

Penetration Testing Contact Baltics

Tomas Beinaravičius

Director, Cyber & Digital Risk