Penetration Tests are carried out by employing the same techniques as an attacker located outside
your infrastructure and verify if your servers or applications will resist hostile attacks and if the
identified vulnerabilities can lead to further intrusion and exploitation. This is performed as a
confidential partnership, according to an agreed-upon scope and without revealing any information
about your environment.