Pentest

You can call us if you need help with a pentest +31 (0)30 899 3984.

You need a pentest report

You need to show your customers that you take cyber security serious and that your software can be trusted. Codean Labs provides the expertise you need. Please do not hesitate to call or email us to discuss your situation. We will be:

  • Human: all our pentests are performed by actual (ethical) hackers with decades of experience to find the real vulnerabilities hidden in your software.
  • Responsive: you will have direct access to talk with us about security like how to best mitigate vulnerabilities or discuss the potential security impact of new features you are busy designing.
  • Transparent: typical pentests are like black-boxes, they give you a price and you hand over materials and you get back a pentest reports. Instead we are transparant upfront about our prices and share with you anything we find during the pentest.
Pricing

Dealing with a pentest from A to Z

Roughly the process of a pentest follow the same steps:

  • A 30-minute call to discuss your situation, needs and answer any questions you might have.
  • If we can help you, we provide you with a detailed quotation based on your needs and situation.
  • After gaining access to all prerequisites we start the pentest
    • We directly share vulnerabilities via the issue tracker
    • Setup a shared communication channel in which you can ask questions, schedule a call for technical discussions, etc
    • Incorporate any changes or fixes directly to the results
  • We provide you with a pentest report that can be shared with your customers or auditors

Keep your cybersecurity up to date

We do not believe our job ends with delivering a pentest report, it just started. In our quotation we provide you with an optional package to keep tagging along for a monthly fee. This provides you with many benefits including but not limited:

  • Peace of mind that your software is still secure after adding features
  • Quarterly updated pentest reports
  • Direct access to our ethical hackers to discuss how to securely implement new features
  • If we find vulnerabilities in dependencies we will immediately notify you with mitigations

In short, you have a dedicated security engineer on your team!

We are here for you