Abstract turquoise background with white connected lines and dots.
Audit symbol: A white shield symbol on a transparent background.

Audit

Audit

We identify vulnerabilities and security gaps in your company.

We assess information security – Our internal audits and pentests are the ultimate security audit for your digital footprint.

During an internal audit, our certified auditors analyze the current status in your company together with you. In comparison with the target state, we identify gaps and weaknesses and collaboratively develop a plan to elevate the security level of your company to the next level.

Our pentest team consists of certified pentesters who come from various fields and bring a wealth of experience in infrastructure, application, technology, and system security. The team audits your internal and external infrastructure, checks the security of your applications, and performs password checks as well as OSINT and dark web analyses.

Abstract turquoise background with white connected lines and dots.
Audit symbol: A white shield symbol on a transparent background.

Audit

We identify vulnerabilities and security gaps in your company.

We assess information security – Our internal audits and pentests are the ultimate security audit for your digital footprint.

During an internal audit, our certified auditors analyze the current status in your company together with you. In comparison with the target state, we identify gaps and weaknesses and collaboratively develop a plan to elevate the security level of your company to the next level.

Our pentest team consists of certified pentesters who come from various fields and bring a wealth of experience in infrastructure, application, technology, and system security. The team audits your internal and external infrastructure, checks the security of your applications, and performs password checks as well as OSINT and dark web analyses.

We identify vulnerabilities and security gaps in your company.

We assess information security – Our internal audits and pentests are the ultimate security audit for your digital presence.

During an internal audit, our certified auditors will analyze the current situation in your company together with you. By comparing it to the desired state, we will identify gaps and weaknesses and work with you to develop a plan to elevate the security level of your company to the next stage.

Our pentest team consists of certified pentesters from various fields who bring a wealth of experience in infrastructure, application, technology, and system security. The team audits your internal and external infrastructure, reviews the security of your applications, and conducts password checks, as well as OSINT and dark web analyses.

The path to the internal audit

The path to the internal audit

Do you want or need to get certified?
Are you unsure how to approach this topic?
Would you like to improve security in your company?
We are happy to help you! Contact us today and take the first step. Together we will determine where your company stands in terms of security and how you can improve it.

Do you want or need to get certified?
Are you unsure how to approach the topic?
Do you want to improve security in your company?
We are happy to help you! Contact us today and take the first step. Together we will determine where your company's security stands and how you can improve it.

Make an appointment

Make an appointment

Make an appointment

Every beginning is hard? Not with us. Simplify an appointment with our experts and take the first step. Just fill out the contact form. We will get back to you quickly.

Every beginning is hard? Not with us. Simplify an appointment with our experts and take the first step. Just fill out the contact form. We will get back to you quickly.
Every beginning is hard? Not with us. Simplify an appointment with our experts and take the first step. Just fill out the contact form. We will get back to you quickly.

First conversation

First conversation

First conversation

In our first conversation, we get to know each other and assess the effort based on your needs. Furthermore, we inform you about our approach, communication, and the process of care.

In our first conversation, we get to know each other and assess the effort based on your needs. Furthermore, we inform you about our approach, communication, and the process of care.
In our first conversation, we get to know each other and assess the effort based on your needs. Furthermore, we inform you about our approach, communication, and the process of care.

Audit plan

Audit plan

Audit plan

After the initial discussion, you will receive the audit plan for the audit from us. This contains an overview of the processes/systems to be examined and serves to identify the various interview partners from your company. This way, you can easily plan the audit date.

After the initial discussion, you will receive the audit plan for the audit from us. This contains an overview of the processes/systems to be examined and serves to identify the various interview partners from your company. This way, you can easily plan the audit date.
After the initial discussion, you will receive the audit plan for the audit from us. This contains an overview of the processes/systems to be examined and serves to identify the various interview partners from your company. This way, you can easily plan the audit date.

Conducting the internal audit/pentest

Conducting the internal audit/pentest

Conducting the internal audit/pentest

We will conduct a current analysis together, identify gaps and weaknesses. This will help us collectively improve the security level and set the course for a successful certification.

We will conduct a current analysis together, identify gaps and weaknesses. This will help us collectively improve the security level and set the course for a successful certification.
We will conduct a current analysis together, identify gaps and weaknesses. This will help us collectively improve the security level and set the course for a successful certification.

Presentation of measures

Presentation of measures

Presentation of measures

We present to you the identified vulnerabilities and gaps and provide you with the right measures to address them.

We present to you the identified vulnerabilities and gaps and provide you with the right measures to address them.
We present to you the identified vulnerabilities and gaps and provide you with the right measures to address them.

Support in implementation

Support in implementation

Support in implementation

Here comes the topic of consulting into play. Should you have any difficulties in implementing the measures, we are available to provide you with advice and assistance. Hand in hand, we help you efficiently implement all corrective measures and achieve your goals and your certification.

Here comes the topic of consulting into play. Should you have any difficulties in implementing the measures, we are available to provide you with advice and assistance. Hand in hand, we help you efficiently implement all corrective measures and achieve your goals and your certification.
Here comes the topic of consulting into play. Should you have any difficulties in implementing the measures, we are available to provide you with advice and assistance. Hand in hand, we help you efficiently implement all corrective measures and achieve your goals and your certification.

Information security audit

Information security audit

Security Check

Security Check

Data protection audit

Data protection audit

Data protection audit

Information security audit

Information security audit

Darknet Monitoring

Darknet Monitoring

Darknet Monitoring

Darknet Monitoring

Security Check

Security Check

Security Check

Darknet Monitoring

Pentesting

Pentesting

Pentesting

Ransomware Simulation

Ransomware Simulation

Ransomware Simulation

Red Teaming

Red Teaming

Red Teaming

TISAX® is a registered trademark of the ENX Association. Schönbrunn TASC GmbH is not in any business relationship with ENX. The mention of the trademark TISAX® is not an indication from the trademark owner regarding the suitability of the services advertised here.

TISAX® is a registered trademark of the ENX Association. Schönbrunn TASC GmbH is not in any business relationship with ENX. The mention of the trademark TISAX® is not an indication from the trademark owner regarding the suitability of the services advertised here.
© 2024 Schönbrunn TASC GmbH
Schönbrunn TASC GmbH
Riedwiesenstraße 1, 71229 Leonberg
© 2024 Schönbrunn TASC GmbH
Schönbrunn TASC GmbH
Riedwiesenstraße 1, 71229 Leonberg
© 2024 Schönbrunn TASC GmbH
Schönbrunn TASC GmbH
Riedwiesenstraße 1, 71229 Leonberg
call to action