We examine your company from an attacker's perspective and provide you with an evaluation of the potential risks and attack vectors of your infrastructure within 24 hours.
Only passive methods are used for this purpose rather than active modes of attack (Information Gathering / Perimeter Analysis). The results of this will be comprised of publicly available information about your company. In some cases this can be very outdated information, such as already invalid e-mail addresses or passwords that have not been used for a long time. For potential attackers, however, such information is of immense importance.