Testimonials - Customer Opinions
To further improve the quality of our penetration tests and to be able to provide our clients with the best possible penetration tests, RedTeam Pentesting performs quality assurance measures. One part of these measures is to ask our customers about their experiences with our service. This includes the possibility to compose a short testimonial.
A random selection of these testimonials can be found below. All opinions are displayed in their original version and were only translated where necessary. They do not necessarily reflect RedTeam Pentesting's opinions. The testimonials displayed are rotated on a regular basis, to provide a comprehensive picture.
Since RedTeam Pentesting tested the security of our web systems I am so relaxed, I need two hours less sleep a day.
RedTeam Pentesting presented quite some ‘eye-openers’ to us and helped us to understand attack scenarios and take appropriate counter-measures.
We invited RedTeam Pentesting to test our website and associated infrastructure, to emulate possible real-world threats. An approach that pays off and is part of our security standard: perform a penetration test once a year.
RedTeam Pentesting conducted the penetration test in a very professional and competent manner. Our expectations for this test were fully satisfied. The presentation of the results was objective and to the point and demonstrated and explained the discovered vulnerabilities in clear terms.
A big 'thank you' to RedTeam Pentesting for the professional advice (on short notice) and the subsequent pentest of one of our most important new applications. We can now go live in good conscience.
If you are searching for an all-around professional penetration test, RedTeam Pentesting is the right company for you. From the constructive preliminary meeting over the regular status updates during the analysis to the extensive final presentation, we experienced a structured, top-quality and professional service. A major benefit is the knowledge transfer through the extensive demonstration and documentation of the vulnerabilities.