Imprint

Privacy

All names, terms, symbols and graphics used here can be brands or trademarks owned by their legal owners. The rights to all mentioned and used brands and trademarks are exclusively owned by their owners.

Company Information

Dynamic Solution IT & Security GmbH & Co. KG

Management: Thorsten Stark / Dmitri Rudi

USt ID-Nummer: DE353718605

Registry Court: Neuss
Registration number: HRB 8126

Responsible for content according to TMG: Thorsten Stark / Dmitri Rudi

Headquarters
Hauptstraße 92
40668 Meerbusch-Lank
Germany

Location West
Düsseldorfer Str. 71
53909 Zülpich
Germany

Tel.: +49 (0) 2150 7058 255
Website: https://dynsol.de
E-Mail: it@dynsol.de

Legal Disclosures

Authorized to represent: Thorsten Stark / Dmitri Rudi

General terms of use for Dynamic Solution IT & Security GmbH & Co. KG

All names, terms, symbols and graphics used here can be brands or trademarks owned by their legal owners. The rights to all mentioned and used brands and trademarks are exclusively owned by their owners.

1. Copyright Information

All information on this website is provided as stated without any claim to correctness, completeness or topicality.

Except as expressly provided otherwise in this publication, in connection with a particular excerpt, file, or document, anyone is permitted to view, copy, print, and distribute this document subject to the following conditions:

The document may only be used for non-commercial informational purposes. Any copy of this document or any part thereof must contain this copyright notice and the copyright notice of the operator. The document, any copy of the document or part thereof may not be modified without the written consent of the operator. Operator reserves the right to revoke this permission at any time and all use must cease immediately upon posting written notice from Operator.

2. Contractual Representations and Waivers

Unless otherwise agreed, the website is available to you free of charge. The operators assume no liability for the accuracy of the information contained, availability of the services, loss of stored data or usability for any specific purpose.

The operators are also not liable for consequential damage resulting from the use of the offer.

Insofar as an exclusion of liability is out of the question, the operators are only liable for gross negligence and intent. Product and company names are trademarks of their respective owners and are used on this site for informational purposes only.

This publication could contain technical or other inaccuracies, or typographical or typographical errors. Changes will be made to this information from time to time; these changes will be incorporated in new editions of the publication. The operator can make improvements and/or changes to the offers described in this publication at any time.

3. Expressing opinions in comments and in the forum

Due to the constantly changing content of comments and in the forum, it is not possible for the operator to view all contributions completely, to check their content and to exercise direct active control over them. No responsibility is taken for the content, the correctness and the form of the posted contributions.

3a. Special Provisions for Registered Users

By registering, the user – hereinafter member – agrees to the operator with the following terms of use:

Members who participate in discussion forums and comments agree to:
1. to refrain from any insults, criminal content, pornography and harsh language in your posts,
2. To bear sole responsibility for the content you post, not to infringe the rights of third parties (in particular trademark, copyright and personal rights) and to fully indemnify the operators from third-party claims triggered by their contributions.
3. Neither in forums nor in comments to place advertising of any kind or to use forums and comments for any kind of commercial activity. This applies in particular to the publication of 0900 numbers for any purpose.

There is no entitlement to the publication of submitted comments or forum contributions. The operators reserve the right to edit or delete comments and forum posts at their own discretion. In the event of violations of the obligations under 1), 2) and 3) the operators also reserve the right to temporarily block or permanently delete membership.

4. Submission of Contributions and Articles

If the member makes use of the opportunity to submit their own contributions for the editorial part, the following applies:

The prerequisite for posting your own contributions is that the member has entered their full and correct first and last name in their user profile or enters them there after submitting the article. The submitted contribution will be marked with the name entered there when it is published (public).

The member makes the following declarations for all contributions that are submitted by him or her in the future:
1. The member assures that the submitted contributions are free from third-party rights, in particular copyright, trademark or personal rights. This applies to all contributions and images submitted.
2. The member grants the operators an unrestricted right to use the submitted contributions. This includes publication on the Internet and on other Internet servers, in newsletters, print media and other publications.
3. Submitted contributions will be deleted or made anonymous again at the request of the member via email to the webmaster’s address. The deletion or anonymization takes place within 7 days after notification. The operators are only liable for consequential damage incurred by the member from the late deletion of the contribution insofar as they are not based on a breach of duty by the member (above under 1), 2) and 3) ) and insofar as they are based on gross negligence or intent on the part of the operator. In this context, we expressly point out that this website is regularly indexed by search engines and that we have no influence on whether, where and for how long contributions published by us may be stored in search engine databases and web catalogues, even after deletion, and be retrievable are.
4. There is no entitlement to storage, publication or archiving of the submitted contributions. The operators reserve the right not to publish submitted contributions without giving reasons, to edit them before publication or to delete them again at their own discretion after publication.
5. The publication of submitted contributions does not give rise to any compensation claims (fees, license fees, reimbursement of expenses or similar) of the member against the operator of the website. Participation is voluntary (unpaid).

5. Privacy Policy

If the opportunity for the input of personal or business data is used within the Internet offer, the disclosure of this data takes place on the part of the user on an expressly voluntary basis. The use of our service is – as far as technically possible and reasonable – permitted without providing such data or by providing anonymous data or a pseudonym. Further important information on the subject of data protection can be found in our privacy policy.

6. Registration and Password

The user is obliged to treat the username/password combination confidentially and not to pass it on to third parties. The operator must be informed if misuse of the access data is suspected.

7. Note in accordance with the Teleservices Act

The respective providers are responsible for third-party websites to which this offer refers via so-called links. The operator is not responsible for the content of such third-party sites. Furthermore, the website can be linked from other sites by means of so-called links without our knowledge. The operator assumes no responsibility for representations, content or any connection to this website on third-party websites. The operator is only responsible for third-party content if there is positive knowledge of it (i.e. also of illegal or criminal content) and it is technically possible and reasonable to prevent its use. According to the Teleservices Act, however, the operator is not obliged to constantly check the external content.

Legal effect

These general terms of use apply to this website.

If parts or individual formulations of this text do not, no longer or not completely correspond to the applicable legal situation, the remaining parts of the document remain unaffected in their content and validity.


Privacy

Privacy

Privacy Policy for Dynamic Solution IT & Security GmbH & Co. KG

We protect your data. In order to use our website, it is generally not necessary to provide personal data. If processing of personal data is necessary in order to make use of a service or an offer, we will obtain the consent of the person concerned in all cases. We observe the General Data Protection Regulation (GDPR), which came into force on May 25th, 2018. Furthermore, of course, we also observe the other regulations (e.g. BDSG) for the processing of personal data. This data protection declaration provides information about the type, scope and purpose of the personal data we collect, use and process. This data protection declaration also serves to provide information about your rights. With our measures we offer the best possible protection of your personal data and its processing. Due to possible gaps in data transmission technology, absolute protection cannot be guaranteed. If in doubt, you should therefore transmit your personal data to us by telephone or in another way.

As a responsible company, we refrain from automated decision-making or profiling of our website visitors and our customers.

Responsible

Dynamic Solution IT & Security GmbH & Co. KG

Management: Thorsten Stark / Dmitri Rudi

USt ID-Nummer: DE353718605

Registry Court: Neuss
Registration number: HRB 8126

Responsible for content according to TMG: Thorsten Stark / Dmitri Rudi

Headquarters
Hauptstraße 92
40668 Meerbusch-Lank
Germany

Location West
Düsseldorfer Str. 71
53909 Zülpich
Germany

Tel.: +49 (0) 2150 7058 255
Website: https://dynsol.de
E-Mail: it@dynsol.de

Data protection

1. Definitions

This privacy policy uses terms specified by the General Data Protection Regulation (GDPR). To make this data protection declaration understandable, the most important terms are explained using the wording of the regulation text. For the purposes of the Regulation, the term means:

a) personal data

“personal data” means any information relating to an identified or identifiable natural person (hereinafter “data subject”); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or one or more special features that express the physical , physiological, genetic, mental, economic, cultural or social identity of that natural person;

b) data subject

“Data subject” is any identified or identifiable natural person whose personal data is processed by the controller.

c) processing

“Processing” means any process carried out with or without the help of automated processes or any such series of processes in connection with personal data, such as collection, recording, organisation, ordering, storage, adaptation or modification, reading out, querying, use , disclosure by transmission, distribution or any other form of making available, matching or linking, restriction, deletion or destruction;

d) Restriction of processing

“restriction of processing” the marking of stored personal data with the aim of restricting their future processing;

e) Profiling

“Profiling” any type of automated processing of personal data, which consists in using this personal data to evaluate certain personal aspects relating to a natural person, in particular aspects related to work performance, economic situation, health, personal Analyze or predict that natural person’s preferences, interests, reliability, behaviour, whereabouts or relocation;

f) Pseudonymization

“Pseudonymization” means the processing of personal data in such a way that the personal data can no longer be assigned to a specific data subject without the use of additional information, provided that this additional information is stored separately and is subject to technical and organizational measures that ensure that the personal data not attributed to an identified or identifiable natural person;

g) Controller or data controller

“Responsible” the natural or legal person, public authority, agency or other body that alone or jointly with others decides on the purposes and means of the processing of personal data; if the purposes and means of this processing are specified by Union law or the law of the Member States, the person responsible or the specific criteria for his naming can be provided for by Union law or the law of the Member States;

h) processors

“Processor” a natural or legal person, public authority, agency or other body that processes personal data on behalf of the controller;

i) Recipient

“Recipient” a natural or legal person, public authority, agency or other body to which personal data are disclosed, whether a third party or not. However, authorities that may receive personal data as part of a specific investigation under Union or Member State law are not considered recipients; the processing of this data by said authorities is carried out in accordance with the applicable data protection regulations according to the purposes of the processing;

j) third party

“third party” a natural or legal person, public authority, agency or other body other than the data subject, controller, processor and persons who, under the direct responsibility of the controller or processor, are authorized to process the personal data;

k) Consent

“Consent” of the data subject means any voluntary, informed and unequivocal expression of will in the specific case, in the form of a declaration or other clear affirmative action, with which the data subject indicates that they consent to the processing of their personal data agrees;

2. Name and address of the person responsible for processing

The person responsible within the meaning of the General Data Protection Regulation and other data protection regulations is:

Dynamic Solution IT & Security GmbH & Co. KG
Hauptstr. 92
40688 Meerbusch
Germany
Tel.: +49 (0) 2150 7058 255
E-Mail: it@dynsol.de
Website: https://dynsol.de

3. Name and address of the data protection officer

The data protection officer of the person responsible for processing is:

Any data subject can contact our data protection officer directly at any time with any questions or suggestions regarding data protection.

4.Cookies

Cookies are files that serve as identifiers. We transfer these to your computer’s hard drive using your web browser and can read the cookies during each visit to our websites. With these so-called permanent cookies, we use a pseudonym to protect your data. Cookies contain a cookie ID. This is a unique identifier of the cookie. This enables us to assign internet pages and servers to the internet browser. Our short-term cookies are not specially encrypted by us. However, they are protected against being read by third parties by the security standard of your browser. Your browser is recognized through the use of cookies. This enables us to tailor our offer to your preferences. Consult your web browser’s help function for instructions on how to instruct your browser to display new cookies, not accept new cookies, or to disable all cookies received. You can also object to the creation of your usage profile using cookies at any time.

5. General Data and Information Collection

Every time one of our Internet pages is called up, we collect general data and information using an automatic system, which is stored in log files on the server. The recording primarily concerns the type of browser used, its versions, the operating system on which the browser is operated, the last website from which the visitor came to our website (referrer), among websites which referred to our website via another system the date and time of access to the respective website, the Internet protocol address (IP address), the identifier of the Internet service provider and other data and information serving security purposes. We do not use this data to draw conclusions about the data subject. This data is only collected with the aim of presenting our website in an optimized manner and to further improve our systems as well as to make this data available to law enforcement authorities if we become the victim of a hacker attack. In this respect, we use your data to support system administration, to create statistics and, if necessary, to comply with our legal obligations. Log file data is always stored separately from other personal data.

6. Registration, Newsletter

If the possibility to register is opened on our website for the use of our services and for obtaining information (e.g. newsletter), the respective personal data entered will be transmitted to the person responsible for processing. With the registration, the Internet Protocol address and the date and time are also saved. This personal data is only collected, stored and used internally to provide these services or to transmit the information requested. If necessary, the personal data will only be passed on by the person responsible to processors for these exclusive purposes. The personal data collected during registration will be deleted from the inventory of the person responsible for processing upon request by the person concerned. The person concerned must request information about the personal data stored about them at any time by making a corresponding request.

7. Web beacons

Our websites and newsletters may contain tracking pixels. These are small embedded graphics that we use to record a log file and then analyze it. If you open a page or the newsletter, the tracking pixel is loaded from a server on the Internet and registered with us with the IP address you are using and, if necessary, also with your cookie ID (see Cookies). This allows us to track exactly which pages you have visited and what actions you have taken there. We may use the information obtained about you to present our Internet advertising to you in a targeted manner on our advertising websites or to optimize and personalize the content of our newsletters. This data will not be passed on. If you do not want an automated personalized evaluation, you can object at any time. To do this, send us an email to “it@dynsol.de” In this case, cookies will continue to be set, but only to exclude you from the evaluation. Your personal data will then no longer be evaluated by us.

8. Contact via the website

Our website contains the relevant information for contacting our company. If an affected person contacts us by e-mail or via our contact form, personal data will be stored. The storage takes place solely for the purpose of contacting the person concerned. This personal data will not be passed on to third parties.

9. Deletion and blocking of personal data

Personal data is regularly blocked and/or deleted in accordance with the laws and regulations on data protection to which the person responsible is subject, after the storage purpose has ceased to apply and, if necessary, after a storage period prescribed by law has expired.

10. Rights of the data subject

A data subject has the right to request confirmation from the person responsible as to whether he is processing personal data relating to the person.

A data subject has the right to receive information from the person responsible free of charge about the personal data stored about the data subject (as a copy). The following information is provided in this respect: Processing purposes, categories of data, recipients or categories of recipients, if possible, the planned duration of storage of the personal data or criteria for determining this duration, the existence of a right to correction or deletion of the personal data or to Restriction of processing by the person responsible or a right to object to processing, the existence of a complaints court at a supervisory authority, information about the origin of the data, the existence of automated decision-making including profiling and information about the transfer of personal data to a third country or to an international organization.

Furthermore, the information contains all other information required by the General Data Protection Regulation.

A data subject has the right to have their stored personal data corrected.

A data subject has the right to erasure (right to be forgotten) of their stored personal data.

A data subject has the right to restrict the processing of their personal data.

A data subject has the right to data portability of their personal data, which was provided by the data subject to the person responsible. In detail, this means that the person responsible must be provided with the personal data in a structured, common and machine-readable format. The data subject also has the right for the person responsible to provide the personal data to another person responsible. However, this only applies if the other requirements of the GDPR are met.

A data subject has the right to object to the processing of personal data concerning them and profiling based thereon under the conditions of the GDPR with the corresponding legal consequences.

A data subject has the right to withdraw their consent to the processing of personal data.

With regard to all rights, the person concerned can contact an employee of the person responsible.

11. Use of Google Analytics (with anonymization function)

The person responsible for processing uses the addition “_gat._anonymizeIp” for the web analysis via Google Analytics. By means of this addition, the IP address of the Internet connection of the data subject is shortened and anonymized by Google if our Internet pages are accessed from a member state of the European Union or from another state party to the Agreement on the European Economic Area.

The purpose of the Google Analytics component is to analyze visitor flows on our website. Google uses the data and information obtained, among other things, to evaluate the use of our website, to compile online reports for us that show the activities on our website, and to provide other services related to the use of our website.

Google Analytics places a cookie on the information technology system of the data subject. What cookies are has already been explained above. By setting the cookie, Google is enabled to analyze the use of our website. Each time one of the individual pages of this website is called up, which is operated by the person responsible for processing and on which a Google Analytics component has been integrated, the Internet browser on the information technology system of the person concerned is automatically activated by the respective Google Analytics component to transmit data to Google for online analysis. As part of this technical process, Google obtains knowledge of personal data, such as the IP address of the person concerned, which Google uses, among other things, to trace the origin of visitors and clicks and subsequently to enable commission statements.

The cookie is used to store personal information, such as access time, the location from which access was made and the frequency of visits to our website by the person concerned. Each time you visit our website, this personal data, including the IP address of the Internet connection used by the person concerned, is transmitted to Google in the United States of America. This personal data is stored by Google in the United States of America. Google may pass on this personal data collected via the technical process to third parties.

The person concerned can prevent the setting of cookies by our website, as already described above, at any time by means of a corresponding setting in the Internet browser used and thus permanently object to the setting of cookies. Such a setting of the Internet browser used would also prevent Google from setting a cookie on the information technology system of the person concerned. In addition, a cookie already set by Google Analytics can be deleted at any time via the Internet browser or other software programs.

Furthermore, the data subject has the option of objecting to and preventing the collection of data generated by Google Analytics relating to the use of this website and the processing of this data by Google. To do this, the data subject must download and install a browser add-on from the link https://tools.google.com/dlpage/gaoptout. This browser add-on tells Google Analytics via JavaScript that no data and information about visits to websites may be transmitted to Google Analytics. The installation of the browser add-on is evaluated by Google as a contradiction. If the information technology system of the person concerned is later deleted, formatted or reinstalled, the person concerned must reinstall the browser add-on in order to deactivate Google Analytics. If the browser add-on is uninstalled or deactivated by the person concerned or another person who is attributable to their sphere of influence, there is the possibility of reinstalling or reactivating the browser add-on.

Further information and Google’s applicable data protection regulations can be found at https://www.google.de/intl/de/policies/privacy/ and at https://www.google.com/analytics/terms/de.html. Google Analytics is explained in more detail under this link https://www.google.com/intl/de_de/analytics/.

12. Legitimate interests in processing pursued by the controller or a third party

The processing of personal data can be in the legitimate interest of conducting our business for the benefit of our employees and our shareholders, Art. 6 para. 1 lit. f DSGVO.

13. Statutory and contractual provisions regarding the provision of personal data

Finally, we explain that personal data must be stored in part due to laws or in the event that there are contractual obligations to do so. Personal data must be collected and stored, particularly when a contract is concluded. For further clarification of his rights, the person concerned must contact one of our employees before providing personal data.


Pentest

Pentest

Modern pentesting prevents future cyber attacks

Learn more
Pentest

Dynamic Solution attacks to protect you.

We examine the internal and publicly accessible infrastructure of your company, as well as the real risk potential of various attack scenarios.

DYNSOL attacks to protect you.

We examine the internal and publicly accessible infrastructure of your company, as well as the real risk potential of various attack scenarios.

Configure nowFree advice

KEYFACTS

Identification

With a penetration test, you not only identify weak points and points of attack, but also check the effectiveness of protective measures that have already been implemented.

Resilience

Regular penetration tests increase the resilience of your IT infrastructure, applications and employees against real attacks and threat actors

Fix

After completing a penetration test, you will receive detailed recommendations on how to fix vulnerabilities. Minimize the potential for real hackers to attack by acting early.

You will receive comprehensive, comprehensible reports from us, which contain a basis for decision-making for those responsible and concrete instructions for the developers.

You will receive comprehensive, comprehensible reports from us, which contain a basis for decision-making for those responsible and concrete instructions for the developers.


Use our pentest configurator for a non-binding offer


GET STARTED

0$

Vielen Dank. Wir melden Uns Zeitnah bei Ihnen.

Prüfobjekt

Wählen Sie die Art des Penetrationstests.

Für eine Mehrauswahl fahren Sie bitte mit Ihrer ersten Konfiguration fort. Nach Abschluss haben Sie die Möglichkeit, einen zweiten Test hinzuzufügen. Sollten Sie sich unsicher sein oder einen Penetrationstest benötigen, welcher noch nicht im Konfigurator existiert, so nehmen Sie bitte Kontakt mit uns auf. Wir beraten Sie gerne bzw. erstellen Ihnen ein manuelles Angebot.

IT-Infrastruktur

Zur Ermittlung des aktuellen Sicherheitsstands Ihrer IT-Infrastruktur bieten wir Ihnen verschiedene Optionen.

Szenariobasierte Tests

Identifizieren Sie in einer sicheren Umgebung das reale Risikopotential verschiedener Angriffsszenarien für Ihr Unternehmen.


0$

You need to select an item to continue

Details IT-Infrastruktur

Interne IT-Infrastruktur

Der Penetrationstest der internen IT-Infrastruktur, beinhaltet eine Sicherheitsanalyse der internen IT-Infrastruktur aus der Perspektive eines internen Angreifers.
Öffentlich erreichbare IT-Infrastruktur

Der „Penetrationstest der öffentlich erreichbaren Systeme“ beinhaltet eine Sicherheitsanalyse aller Ihrer aus dem Internet erreichbaren Systeme, aus der Perspektive eines externen Angreifers.

0$

You need to select an item to continue

Details Szenariobasierte Tests

Evil Employee

Beschreibung

Passive Reconnaissance

Beschreibung


0$

You need to select an item to continue

Interne Infrastruktur

Der „Penetrationstest der internen IT-Infrastruktur“, beinhaltet eine Sicherheitsanalyse der internen IT-Infrastruktur aus der Perspektive eines internen Angreifers.

Wieviele Systeme/IP Adressen befinden sich im Umfang der Tests?

Wir führen einen automatisierten Schwachstellenscan, sowie eine manuelle Analyse der aktiven Netzwerkdienste durch. Ziel unserer Tests ist es, eine Aussage über die potentielle Gefahr von Angriffen auf Ihre internen IT-Infrastrukturkomponenten machen zu können.

Die Durchführung unserer Tests hat keine Auswirkungen auf die Verfügbarkeit der im Projektumfang definierten Systeme. Unser Basisprüfprogramm für die Prüfung der internen IT-Infrastruktur beinhaltet folgende Dienstleistungen: Einen automatisierten Schwachstellenscan der internen Infrastruktur Eine manuelle Analyse der aktiven Netzwerkdienste Verifizierung aller identifizierten Schwachstellen Ausnutzung von Schwachstellen (nach Absprache mit Ihnen) Dokumentation aller Findings im Abschlussbericht und Maßnahmenkatalog.


0$

You need to select an item to continue

Add-Ons

Sicherheitsüberprüfung von Netzwerkfreigaben

Konfigurationsprobleme bei Netzwerkfreigaben stellen oft eine Gefahr für die Vertraulichkeit, die Integrität oder die Verfügbarkeit von sensitiven Daten dar. Gerne identifizieren und überprüfen wir alle verfügbaren Netzwerkfreigaben in ihrem Netzwerk.

Angriffssimulation: Interner Angreifer

Die Angriffssimulation simuliert einen echten Angreifer mit Zugriff auf einen Netzwerkport im internen Netzwerk. Hierbei liegt der Fokus darauf die volle Kontrolle über die interne IT-Infrastruktur zu bekommen bzw. kritische Teile der IT-Infrastruktur zu kompromittieren.

Evil Employee

Umfassende Sicherheitsanalyse eines von Ihnen bereitgestellten Firmen-Notebooks aus der Sicht eines angestellten Mitarbeiters mit bösen Absichten.


0$

You need to select an item to continue

Informationen

Projektname

Der Projektname hilft uns, wenn sie mehrere Anfragen stellen.

Testzeiten (Web)

Was wäre das tägliche Zeitfenster in dem unsere aktiven Tests durchgeführt werden können?

Falls Tests außerhalb der Geschäftszeiten gewünscht sind, erhöhen sich die Kosten für unsere Tests.

Geschäftszeiten der  GmbH Mo-Fr 7:00 – 18:00 (MESZ)

Bemerkung: Unsere Tests beabsichtigten nicht den allgemeinen Geschäftsprozess zu stören oder Verfügbarkeitsprobleme zu verursachen.

Prüfort

Bestimmte Penetrationstests können nur vor Ort oder auch nur von extern durchgeführt werden. Je nach Prüfobjekt können Sie hier den Prüfort entsprechend auswählen.

Prüfabschluss

Bei jedem Pentest ist ein ausführlicher Bericht und ein Maßnahmenkatalog enthalten. Zusätzlich bieten wir entweder ein Abschlussgespräch per Webkonferenz oder auch vor Ort an.

Berichtssprache

Wir können den Abschlussbericht in Deutsch oder Englisch verfassen. Wählen Sie bitte die gewünschte Berichtssprache


0$

You need to select an item to continue

Öffentlich erreichbare IT-Infrastruktur

Der „Penetrationstest der öffentlich erreichbaren Systeme“ beinhaltet eine Sicherheitsanalyse aller Ihrer aus dem Internet erreichbaren Systeme, aus der Perspektive eines externen Angreifers.

Wieviele Systeme/IP Adressen befinden sich im Umfang der Tests?

Unsere Tests beinhalten einen automatisierten Schwachstellenscan, sowie eine manuelle Analyse der aktiven Netzwerkdienste aller im Projektumfang definierten Systeme.

Ziel unserer Tests ist es, eine Aussage über die potenzielle Gefahr eines Angriffs, auf Ihre externe IT-Infrastruktur machen zu können. Unser Basisprüfprogramm für die Prüfung Ihrer öffentlich erreichbaren IT-Infrastruktur beinhaltet folgende Dienstleistungen:

  • Einen automatisierten Schwachstellenscan der öffentlich ertreichbaren IT-Infrastruktur
  • Eine manuelle Analyse der aktiven Netzwerkdienste
  • Verifizierung aller identifizierten Schwachstellen
  • Ausnutzung von Schwachstellen (nach Absprache mit Ihnen)
  • Dokumentation aller Findings im Abschlussbericht und Maßnahmenkatalog

0$

You need to select an item to continue

Add-Ons

Passive Reconnaissance

Die Passive Reconnaissance wird durchgeführt, um soviele sensitive Informationen wie möglich über Ihre Organisation aus öffentlich verfügbaren Ressourcen zu extrahieren.


0$

You need to select an item to continue

Informationen

Projektname

Der Projektname hilft uns, wenn sie mehrere Anfragen stellen.

Testzeiten (Web)

Was wäre das tägliche Zeitfenster in dem unsere aktiven Tests durchgeführt werden können?

Falls Tests außerhalb der Geschäftszeiten gewünscht sind, erhöhen sich die Kosten für unsere Tests.

Geschäftszeiten der  GmbH Mo-Fr 7:00 – 18:00 (MESZ)

Bemerkung: Unsere Tests beabsichtigten nicht den allgemeinen Geschäftsprozess zu stören oder Verfügbarkeitsprobleme zu verursachen.

Prüfort

Bestimmte Penetrationstests können nur vor Ort oder auch nur von extern durchgeführt werden. Je nach Prüfobjekt können Sie hier den Prüfort entsprechend auswählen.

Prüfabschluss

Bei jedem Pentest ist ein ausführlicher Bericht und ein Maßnahmenkatalog enthalten. Zusätzlich bieten wir entweder ein Abschlussgespräch per Webkonferenz oder auch vor Ort an.

Berichtssprache

Wir können den Abschlussbericht in Deutsch oder Englisch verfassen. Wählen Sie bitte die gewünschte Berichtssprache


0$

You need to select an item to continue

Evil Employee

Der szenariobasierte Test „Evil Employee" beinhaltet eine umfassende Sicherheitsanalyse eines von Ihnen bereitgestellten Firmen-Notebooks.

Das Notebook wird vor unseren Tests neu installiert und auf die gleiche Konfiguration wie ein übliches Notebook, welches an einen neuen Mitarbeiter Ihres Unternehmens übergeben wird, eingestellt. Der Fokus unserer Sicherheitsanalyse liegt in der Identifikation vonSchwachstellen, welche von einem Angreifer zur Erweiterung seiner Rechte ausgenutzt werden könnten.

Der Penetrationstest simuliert demnach einen internen Mitarbeiter mit bösen Absichten, der versucht, sich im Firmennetzwerk unerlaubt auszubreiten bzw. seine eingeschränkten Berechtigungen auszuweiten.

Die folgenden Themen stehen im Fokus unserer Sicherheitsanalyse:

  • Patch-Management
  • Sicherheitsanalyse der Konfiguration von Systemdiensten
  • Sicherheitsanalyse von Registry-Einträgen
  • Sicherheitsanalyse von geplanten Aufgaben
  • Identifikation von Möglichkeiten zur Durchführung von DLL-Hijacking
  • Identifikation von sensitiven Zugangsdaten auf dem Dateisystem

0$

You need to select an item to continue

Informationen

Projektname

Der Projektname hilft uns, wenn sie mehrere Anfragen stellen.

Prüfort

Bestimmte Penetrationstests können nur vor Ort oder auch nur von extern durchgeführt werden. Je nach Prüfobjekt können Sie hier den Prüfort entsprechend auswählen.

Prüfabschluss

Bei jedem Pentest ist ein ausführlicher Bericht und ein Maßnahmenkatalog enthalten. Zusätzlich bieten wir entweder ein Abschlussgespräch per Webkonferenz oder auch vor Ort an.

Berichtssprache

Wir können den Abschlussbericht in Deutsch oder Englisch verfassen. Wählen Sie bitte die gewünschte Berichtssprache


0$

You need to select an item to continue

Passive Reconnaissance

Die Passive Reconnaissance wird durchgeführt, um soviele sensitive Informationen wie möglich über Ihre Organisation aus öffentlich verfügbaren Ressourcen zu extrahieren.

Während dieser Phase werden keine aktiven Tests (z.B. Port- oder Schwachstellenscans) durchgeführt, sondern ausschließlich Recherchetätigkeiten mithilfe von öffentlich verfügbaren Ressourcen wie Suchmaschinen, Social-Media und Schwachstellendatenbanken. Der Schwerpunkt dieser Prüfung liegt auf der Identifizierung von Systemen, Diensten, Schwachstellen und sensitiven Informationen, von denen ein Angreifer profitieren könnte.

Dazu gehören Informationen wie:

  • Informationen über die Infrastruktur (z.B. Hosts, IP Ranges, Domains und Subdomains, DNS Records etc.)
  • Sensitive Daten, die öffentlich zugänglich sind (z.B. Konfigurationsdateien, Backups, vertrauliche Dokumente etc.)
  • Informationen über Mitarbeiter Ihrer Organisation (z.B. Benutzernamen, E-Mail Adressen, Telefonnummern, Passwortleaks, sensitive Informationen etc.)
  • Informationen über öffentlich bekannte Schwachstellen in Ihren IT-Infrastrukturkomponenten (z.B. aus Schwachstellendatenbanken)

0$

You need to select an item to continue

Informationen

Projektname

Der Projektname hilft uns, wenn sie mehrere Anfragen stellen.

Prüfabschluss

Bei jedem Pentest ist ein ausführlicher Bericht und ein Maßnahmenkatalog enthalten. Zusätzlich bieten wir entweder ein Abschlussgespräch per Webkonferenz oder auch vor Ort an.

Berichtssprache

Wir können den Abschlussbericht in Deutsch oder Englisch verfassen. Wählen Sie bitte die gewünschte Berichtssprache


0$

You need to select an item to continue

Pentest-Konfiguration


0$

You need to select an item to continue

Geschätzer Endpreis

Der geschätzte Endpreis beträgt:

Zusammenfassung

Description Information Quantity Price
Discount :
Total :

Vulnerability Scan

We find your security gaps before hackers do.

Dynamic Solution finds vulnerabilities in your digital infrastructure to prevent costly data breaches.

Learn more
Vulnerability Scan

Dynamic Solution assesses your security risk as an attacker would.

Our vulnerability scan is the search and identification of weak points. Every year the rate of security gaps increases and your entrepreneurial risk.

Inquire now

Common Vulnerabilities and Exposures

2015:6.487


2016:6.447


2017:14.647


2018:16.511


2019:17.305


2020:18.358


DYNSOL evaluates your security risk like an attacker.

Our vulnerability scan is the search and identification of weak points. Every year the rate of security gaps increases and your entrepreneurial risk.

Inquire now
Time to Fix

On average, it takes organizations 120 days to patch a known vulnerability while your business is at risk.

On average, it takes organizations 120 days to patch a known vulnerability while your business is at risk.

Our scan

Dynamic Solution breaks the lifecycle of a security vulnerability.

DYNSOL interrupts the lifecycle of a vulnerability.

1. Discovery: The vulnerability is discovered and investigated by a third party.

1. Discovery: The vulnerability is discovered and investigated by a third party.

2. Full Disclosure: The discoverer publishes all information.

2. Full Disclosure: The discoverer publishes all information.

3. Advisory available: The manufacturer publishes a vulnerability warning (patch is not yet available, often with workarounds or hints for damage limitation).

3. Advisory available: The manufacturer publishes a vulnerability warning (patch is not yet available, often with workarounds or hints for damage limitation).

Dynamic Solution is your partner

We break the cycle and secure your business and your records.

Inquire now

4. Patch available: The risk continues to increase because the attackers can now identify even more details and attack vectors by analyzing the patch.

4. Patch available: The risk continues to increase because the attackers can now identify even more details and attack vectors by analyzing the patch.

5. Patch installed: On average it takes 100-120 days for the patch to be installed ("time to fix")

5. Patch installed: On average it takes 100-120 days for the patch to be installed ("time to fix")


Career

We are looking for you

Penetration tester in IT security consulting (m/f/d)

Dynamic Solution is now looking for a full-time penetration tester (f/m/d).

We look forward to welcoming you to our motivated team at the Meerbusch location as soon as possible!

Apply now

Penetration tester in IT security consulting (m/f/d)

DYNSOL is now looking for a full-time penetration tester (f/m/d).

We look forward to welcoming you to our motivated team in Düsseldorf as soon as possible!

Apply now
What's waiting for you?

  • Varied customer environment with exciting projects in different industries and company sizes from medium-sized companies to the highest official / political institutions (federal government)
  • Cooperation and exchange of experiences with like-minded people, both internally in a very experienced pentest and red team and externally through events such as Defcon, CCC and Blackhat Convention
  • You will take on a key role in the BLUE team in developing solutions and response measures based on the weaknesses identified by the RED team as part of our service portfolio

What We Demand (Hard Skills)?

  • Completed computer science studies with a focus on IT security or comparable
    Several years of professional experience in penetration testing
  • Well-founded practical experience in the field of penetration testing regarding infrastructures, web applications and/or mobile applications
  • Successfully completed OSCP and OSCE certification as well as OSWE certification desirable
  • Fluency in written and spoken German and English

What do you bring with you (soft skills)?

  • Extraordinary level of intrinsic motivation in the field of IT security
  • Planning, communication and organizational skills as well as a methodical and goal-oriented way of working
  • Affinity in the development and preparation of technical solutions as well as consulting and mediation skills
  • Ability to work in a team, flexibility and a confident demeanor
  • Experience in establishing BLUE team strategies and managing projects and/or teams is desirable

What we offer?

  • Continuous training and further development offers and systematic promotion of your competence and career development (from classic face-to-face training to trail & error measures in our test & hack labs)
  • Dynamic work environment with a high degree of freedom, which opens up new opportunities and invites you to bring in and implement ideas
  • Flexible working hours and the option to use home office offers
  • Innovative and transparent salary structure along purely objective evaluation criteria
    Regular company events in beautiful places in Europe

We are looking for you

Project manager (m/f/d) M&A

We are currently looking to support our teams

Project manager (m/f/d) in the field of M&A

You are part of small project teams with flat hierarchies, in which you will be supported by our experienced project managers. The development possibilities in LIVE projects is a clear objective. You work in a solution-oriented manner and benefit from the many years of experience of our partners.

You will consolidate and expand your skills in the areas of M&A project management, investor communication, company valuation, due diligence, finance, insolvency law and restructuring in a cross-industry project environment.

Apply now

Project manager (m/f/d) M&A

We are currently looking to support our teams

Project manager (m/f/d) in the field of M&A

You are part of small project teams with flat hierarchies, in which you will be supported by our experienced project managers. The development possibilities in LIVE projects is a clear objective. You work in a solution-oriented manner and benefit from the many years of experience of our partners.

You will consolidate and expand your skills in the areas of M&A project management, investor communication, company valuation, due diligence, finance, insolvency law and restructuring in a cross-industry project environment.

Apply now
What's waiting for you?

Challenging tasks - You work across disciplines in the project teams and can apply and improve your individual skills. Take responsibility for sub-projects and develop your leadership skills. As a full team member from day 1, you will be part of M&A transactions in exciting (distressed) M&A projects, which we control and manage on behalf of a wide variety of entrepreneurs and renowned insolvency administrators, from acquisition to closing. Development and promotion of your personal professional interests in a very exciting branch of the economy.

In addition, we support you in building and expanding your personal network, which you should and can consolidate by participating in events and project-related road shows at home and abroad.

Your tasks

  • Support and responsible management of acquisition and sales processes
  • Development of financial models as part of a market-oriented company valuation
  • Identification and addressing of companies
  • Preparation of company and market analyses
  • Creation of marketing documents (information memorandum, teaser...)
  • Accompanying due diligence processes
    support with your tasks
  • Support and responsible management of acquisition and sales processes
  • Development of financial models as part of a market-oriented company valuation
  • Identification and addressing of companies
  • Preparation of company and market analyses
  • Creation of marketing documents (information memorandum, teaser...)
  • Accompanying due diligence processes
  • Support for sales activities

What are you bringing?

  • Have at least a completed bachelor's degree in a business, technical or related field
  • You have professional experience in M&A, private equity or investment banking and have gained transaction experience
  • Has strong analytical skills and thinks in terms of entrepreneurial structures,
    are a team player, but at the same time are not afraid to work independently,
    have a confident demeanor
    has business fluent English and German skills
  • You have the ability to grasp facts quickly and to familiarize yourself with them
  • Are looking for a promising career in management consulting.


Backup & Recovery

Backup & Recovery

We offer you comprehensive backup and recovery solutions

Learn more
Backup & Recovery

Dynamic Solution protects your data.

Well-organized backup and recovery systems are a key requirement for smooth business operations. Dynamic Solution supports you with this highly sensitive topic with a comprehensive range of solutions.

Inquire now

Damage resulting from data loss can quickly run into millions of euros. In extreme cases, a missing or faulty backup can jeopardize the existence of a company. Hardly any company today therefore completely dispenses with backup and recovery or restore strategies.

 

Backup and recovery systems protect against the loss of business-critical data, enable individual files to be backed up after a backup (restore) or restore lost data in the event of a hardware defect (disaster recovery).

At the same time, backup and recovery strategies are also necessary in order to be able to comply with legal regulations such as the auditable accounting according to HGB and the principles of data access and the verifiability of digital documents (GDPdU). A powerful backup and recovery solution can therefore also have a positive effect on the risk assessment according to Basel II.

DYNSOL protects your data.

Well-organized backup and recovery systems are a key requirement for smooth business operations. DYNSOL supports you with this highly sensitive topic with a comprehensive range of solutions.

Damage resulting from data loss can quickly run into millions of euros. In extreme cases, a missing or faulty backup can jeopardize the existence of a company. Hardly any company today therefore completely dispenses with backup and recovery or restore strategies.

 

Backup and recovery systems protect against the loss of business-critical data, enable individual files to be backed up after a backup (restore) or restore lost data in the event of a hardware defect (disaster recovery).

At the same time, backup and recovery strategies are also necessary in order to be able to comply with legal regulations such as the auditable accounting according to HGB and the principles of data access and the verifiability of digital documents (GDPdU). A powerful backup and recovery solution can therefore also have a positive effect on the risk assessment according to Basel II.

Inquire now

Together with you, we develop a backup and recovery solution design that is perfectly tailored to your requirements. We include the entire process from the desktop to the server to the storage systems in our considerations.

 

 

We analyze the status of your current backup and recovery strategy, including the existing contingency plans and the systems, services and processes used. An important part of the analysis are the service level agreements (SLA), in particular the agreements on recovery times and similar performance commitments. In order to achieve an improvement in the cost structure and to ensure that the legal requirements and internal company guidelines are observed, we carry out a comprehensive cost and risk analysis.

 

 

Based on a coordinated migration plan, Dynamic Solution takes on the implementation of the new backup and recovery infrastructure. Depending on the customer's requirements, we can provide the systems directly at the customer's or in two spatially separated data centers of our partner.

Together with you, we develop a backup and recovery solution design that is perfectly tailored to your requirements. We include the entire process from the desktop to the server to the storage systems in our considerations.

 

 

We analyze the status of your current backup and recovery strategy, including the existing contingency plans and the systems, services and processes used. An important part of the analysis are the service level agreements (SLA), in particular the agreements on recovery times and similar performance commitments. In order to achieve an improvement in the cost structure and to ensure that the legal requirements and internal company guidelines are observed, we carry out a comprehensive cost and risk analysis.

 

 

Based on a coordinated migration plan, Dynamic Solution takes on the implementation of the new backup and recovery infrastructure. Depending on the customer's requirements, we can provide the systems directly at the customer's or in two spatially separated data centers of our partner.


Network Service

Network Service

We support you in the planning and installation of your company network.

Learn more
Network Service

Dynamic Solution expands your company network.

A company network - intranet - is an indispensable part of almost every company. The networking of several personal computers alone does not constitute a network.

 

Only the availability of server services for the clients, the system-specific utilization of processor times and joint processing, support for bulk print mailings or specific printing tasks and, if necessary, many other options make a network the efficient and cost-optimized control center of your company.

Inquire now

DYNSOL expands your company network.

A company network - intranet - is an indispensable part of almost every company. The networking of several personal computers alone does not constitute a network.

 

Only the availability of server services for the clients, the system-specific utilization of processor times and joint processing, support for bulk print mailings or specific printing tasks and, if necessary, many other options make a network the efficient and cost-optimized control center of your company.

Inquire now

Migration & Modernization

Migration & Modernization

Service quality from analysis to project acceptance

Learn more
Migration & Modernization

Digitize with Dynamic Solution.

We support you professionally with IT migrations and the modernization of your IT - with reliable, flexible and qualitatively convincing services and solutions.

Inquire now

In order to support your processes in the best possible way, you need powerful IT that is reliable and optimally available at all times. A basis for this are efficient, flexible and scalable IT infrastructure solutions. In order to maintain the performance of your IT, IT migrations and IT modernizations are necessary again and again.

Based on tried-and-tested processes, our experts ensure with their experience and well-founded know-how that the corresponding projects run optimally. We can accompany you in individual steps or along the entire solution path, take over the sub-project management or the overall implementation of the project.

Digitize with DYNSOL.

We support you professionally with IT migrations and the modernization of your IT - with reliable, flexible and qualitatively convincing services and solutions.

In order to support your processes in the best possible way, you need powerful IT that is reliable and optimally available at all times. A basis for this are efficient, flexible and scalable IT infrastructure solutions. In order to maintain the performance of your IT, IT migrations and IT modernizations are necessary again and again.

Based on tried-and-tested processes, our experts ensure with their experience and well-founded know-how that the corresponding projects run optimally. We can accompany you in individual steps or along the entire solution path, take over the sub-project management or the overall implementation of the project.

Inquire now

Irrespective of what we support you with: We harmonize the most modern technical possibilities with your requirements. Based on your needs and your resources, we show you sensible solutions. With the experience from numerous projects, we ensure transparency right from the start, meet deadlines and ensure that your business processes are not affected by migration or modernization projects. What you can expect from us:

Irrespective of what we support you with: We harmonize the most modern technical possibilities with your requirements. Based on your needs and your resources, we show you sensible solutions. With the experience from numerous projects, we ensure transparency right from the start, meet deadlines and ensure that your business processes are not affected by migration or modernization projects. What you can expect from us:

  • Analysis of the current situation and identification of weak points.
  • Needs assessment together with you.
  • Development of alternative solution proposals and concepts including benefit analysis and solution recommendation.
  • Implementation of the implementation projects up to acceptance by you.
  • Service quality and transparency in the overall process.
  • Use of modern project management tools.
  • Compliance with cost, time and budget frameworks.

System Administration

System Administration

IT service  tailored to your needs

Learn more
System-Administration

Dynamic Solution is your long-term partner.

Once the individual conception and implementation of your architecture is complete, we are still there to support you. We help to secure IT operations in day-to-day business, offer comprehensive system administration and otherwise ensure that no questions remain unanswered.

Inquire now

System-Administration

Once the individual conception and implementation of your architecture is complete, we are still there to support you. We help to secure IT operations in day-to-day business, offer comprehensive system administration and otherwise ensure that no questions remain unanswered.

Inquire now
Inventory / inventory management

Cataloging and labeling of existing and newly acquired hardware and software, network technology

Documentation according to requirement profile

Actual analysis / continuous logging of planned and completed work steps

Backup Monitoring

Checking regularly executed data backups for existence, consistency and storage availability

Update Management

Regular planning, functional tests, distribution and installation of security patches and software updates, anti-virus signature update check

Licence Management

Management and monitoring of existing software licenses and advice on planned software investments

Serveradministration

Support and maintenance of local servers / server systems or web servers in the data center with all relevant operating systems, e.g. Microsoft Windows 2012/R2, 2016, 2019 and Linux.