Alarm Tests

from the outside & inside

Do you detect typical attack attempts on your systems? Via the internet? And within your internal environment?

Routine testing of smoke detectors makes sense. The same applies to your attack detection. That’s why we put it to the test and carry out typical attack activities to uncover blind spots.

The questions above are typically answered during Red Teaming. However, the answers are also increasingly interesting for companies that, for various reasons, cannot implement Red Teaming. That’s why we created our Alarm Tests.

Alarm Tests can also be easily combined with “classic” pentests:

Starting with an Alarm Test: We begin with an alarm test and try to remain undetected. During this process, our attack activities become increasingly conspicuous. We document our activities in a log so that you can later understand what happened and close any blind spots in your detection.

Transition to Pentest: Depending on the reactions and agreement, we switch to a typical pentest approach after a few days. By then, everyone is informed, and the goal is to efficiently uncover as many vulnerabilities as possible and we no longer need to hide.

 

Why Alarm Tests

s

Our main reasons for Alarm Tests:

  • A reality check for your attack detection, whether implemented internally or by an external SOC
  • Uncovering blind spots in attack detection
  • Fundamentally a Red Teaming approach, but significantly more budget-friendly than full-scale Red Teamings

When to use Alarm Tests

In our view, the best times are:

  • Attack detection (newly) in use
  • You want to continuously improve your attack detection
  • Your IT maturity level is ready for “more than pentests,” but a “large” Red Teaming is not an option

Results

i
Typical results of an Alarm Test include:

  • Activity log to track what happened and when
  • Insights into blind spots in your attack detection that you can subsequently address
  • Depending on how comprehensive we make the Alarm Test: gaps and potential for improvement in organizational processes for attack detection and defense

What we need from you

For Alarm Tests, we require from you:

  • External Alarm Tests: your consent
  • Internal Alarm Tests: access to a standard workstation

Book a free initial consultation now

Whether it’s a pentest, red teaming, or “something in between”—
we look forward to talking to you!