{"id":8189,"date":"2024-05-31T08:55:18","date_gmt":"2024-05-31T06:55:18","guid":{"rendered":"https:\/\/smarttecs.com\/cyber-security\/services\/penetration-tests\/"},"modified":"2025-06-23T08:30:29","modified_gmt":"2025-06-23T06:30:29","slug":"penetration-tests","status":"publish","type":"page","link":"https:\/\/smarttecs.com\/en\/cyber-security\/services\/penetration-tests\/","title":{"rendered":"Penetration Tests"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8189\" class=\"elementor elementor-8189 elementor-1547\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c83612 e-con-full e-flex e-con e-parent\" data-id=\"0c83612\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/smarttecs.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cs-hacking-sd.mov&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div><div class=\"elementor-element elementor-element-a935d82 e-flex e-con-boxed e-con e-child\" data-id=\"a935d82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae7e661 elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-the7-breadcrumb\" data-id=\"ae7e661\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7-breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"assistive-text\">You are here:<\/div><ol class=\"breadcrumbs text-small rcrumbs\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\"><li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/smarttecs.com\/en\/\" title=\"Home\"><span itemprop=\"name\">Home<\/span><\/a><meta itemprop=\"position\" content=\"1\" \/><\/li><li class=\"current\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\">Page<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li><\/ol>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4d521c elementor-widget elementor-widget-heading\" data-id=\"e4d521c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Penetration Tests<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4466f81 elementor-widget elementor-widget-heading\" data-id=\"4466f81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security analysis of your systems and products<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec872d1 e-flex e-con-boxed e-con e-parent\" data-id=\"ec872d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5b8867 elementor-widget elementor-widget-heading\" data-id=\"c5b8867\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Offensive security. Minimize risks. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c9004c elementor-widget elementor-widget-text-editor\" data-id=\"0c9004c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our approach to IT security is based on carefully conducted, simulated attacks. We test your IT infrastructure or analyze your software products to precisely evaluate the existing level of security. Our goal is to strengthen your security measures and effectively shield your company against cyber threats. We attach great importance to a holistic view of the security architecture in order to ensure comprehensive protection and minimize potential risks.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25fda27 e-flex e-con-boxed e-con e-parent\" data-id=\"25fda27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0692e9e e-flex e-con-boxed e-con e-child\" data-id=\"0692e9e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74ef0aa elementor-widget elementor-widget-image\" data-id=\"74ef0aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/webanwendung\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/elementor\/thumbs\/AdobeStock_408079686-1-qumanfgiyhmey8lqhzxtsgf8l400lic7nlb5wbv3fi.jpeg\" title=\"Programming code abstract technology background of software deve\" alt=\"Programming code abstract technology background of software developer and  Computer script 3d illustration\" class=\"elementor-animation-float\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dac6cb elementor-widget elementor-widget-heading\" data-id=\"2dac6cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Web application<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5271307 elementor-widget elementor-widget-text-editor\" data-id=\"5271307\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Examination of your web application according to recognized IT security standards.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-857b700 elementor-widget elementor-widget-the7_button_widget\" data-id=\"857b700\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/webanwendung\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-def757e e-flex e-con-boxed e-con e-child\" data-id=\"def757e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5346ca1 elementor-widget elementor-widget-image\" data-id=\"5346ca1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/mobile-anwendungen\/\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"671\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/cs_mobile_hq-1200x671.webp\" class=\"elementor-animation-float attachment-large size-large wp-image-6518\" alt=\"Mobile Penetrationtest\" srcset=\"https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/cs_mobile_hq-1200x671.webp 1200w, https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/cs_mobile_hq-600x335.webp 600w, https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/cs_mobile_hq-768x429.webp 768w, https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/cs_mobile_hq-1536x858.webp 1536w, https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/cs_mobile_hq-2048x1144.webp 2048w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8eaf24 elementor-widget elementor-widget-heading\" data-id=\"a8eaf24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Mobile applications<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3470866 elementor-widget elementor-widget-text-editor\" data-id=\"3470866\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Identifying and fixing vulnerabilities in iOS and Android applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-055e47e elementor-widget elementor-widget-the7_button_widget\" data-id=\"055e47e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/mobile-anwendungen\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f261157 e-flex e-con-boxed e-con e-child\" data-id=\"f261157\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3265678 elementor-widget elementor-widget-image\" data-id=\"3265678\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/it-infrastruktur\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/elementor\/thumbs\/cs_infra-pentest_hq-scaled-qul2470k2cwydve39hotfiysyo50qqlxkbfr2yzuam.webp\" title=\"cs_infra-pentest_hq\" alt=\"Penetrationtest einer IT-Infrastruktur\" class=\"elementor-animation-float\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9cda0eb elementor-widget elementor-widget-heading\" data-id=\"9cda0eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">IT infrastructure<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1e6097 elementor-widget elementor-widget-text-editor\" data-id=\"b1e6097\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Investigation of software systems and IT landscapes at the network level from the perspective of a malicious actor.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90a19cc elementor-widget elementor-widget-the7_button_widget\" data-id=\"90a19cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/it-infrastruktur\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42064c7 e-flex e-con-boxed e-con e-parent\" data-id=\"42064c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a174be9 e-flex e-con-boxed e-con e-child\" data-id=\"a174be9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27c00c5 elementor-widget elementor-widget-image\" data-id=\"27c00c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/active-directory\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/elementor\/thumbs\/cs_ad_hq-scaled-qul24dlfe75yn54j72j7ezb14d8l8mc1x805fwq332.webp\" title=\"cs_ad_hq\" alt=\"Active Directory Penetrationtest\" class=\"elementor-animation-float\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b8e06d elementor-widget elementor-widget-heading\" data-id=\"7b8e06d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Active Directory<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81448bd elementor-widget elementor-widget-text-editor\" data-id=\"81448bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Analysis of your on-premises, cloud or hybrid Microsoft Active Directory environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9630847 elementor-widget elementor-widget-the7_button_widget\" data-id=\"9630847\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/active-directory\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-264bb56 e-flex e-con-boxed e-con e-child\" data-id=\"264bb56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2a4859 elementor-widget elementor-widget-image\" data-id=\"c2a4859\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/cloud-security-audit\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"673\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/AdobeStock_753164179-1-1200x673.jpeg\" class=\"elementor-animation-float attachment-large size-large wp-image-6438\" alt=\"\" srcset=\"https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/AdobeStock_753164179-1-1200x673.jpeg 1200w, https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/AdobeStock_753164179-1-600x336.jpeg 600w, https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/AdobeStock_753164179-1-768x431.jpeg 768w, https:\/\/smarttecs.com\/wp-content\/uploads\/2024\/09\/AdobeStock_753164179-1.jpeg 1500w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f0581e elementor-widget elementor-widget-heading\" data-id=\"0f0581e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cloud Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fe9fd6 elementor-widget elementor-widget-text-editor\" data-id=\"7fe9fd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Testing the cloud infrastructure for vulnerabilities, misconfigurations and potential attack points.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a1e454 elementor-widget elementor-widget-the7_button_widget\" data-id=\"7a1e454\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/cloud-security-audit\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a52eb9 e-flex e-con-boxed e-con e-child\" data-id=\"4a52eb9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4b5aaa elementor-widget elementor-widget-image\" data-id=\"a4b5aaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/wifi-audit\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/elementor\/thumbs\/cs_wifi-audit_hq-scaled-qul24arwtp23ob8mnjbbpi0nc7mhlj0uwu1p02u9lq.webp\" title=\"cs_wifi-audit_hq\" alt=\"Penetrationtest des\" class=\"elementor-animation-float\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a698f elementor-widget elementor-widget-heading\" data-id=\"a5a698f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Wireless Audit<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2dfa8b elementor-widget elementor-widget-text-editor\" data-id=\"d2dfa8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Analysis of public and private wireless IT infrastructures for vulnerabilities and misconfigurations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9bafbc elementor-widget elementor-widget-the7_button_widget\" data-id=\"a9bafbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/wifi-audit\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1240216 e-flex e-con-boxed e-con e-parent\" data-id=\"1240216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-17e4230 e-flex e-con-boxed e-con e-child\" data-id=\"17e4230\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e0ffa9 elementor-widget elementor-widget-image\" data-id=\"4e0ffa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/iot-digitale-produkte-iec-62443\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/elementor\/thumbs\/OT-Security-scaled-1-qumanvfs6o8aflyiwouhgue2ont98d3ndsef217ehq.jpeg\" title=\"Smart industry 4.0 concept, Person use tablet with virtual screen of physical system, smart industrial revolution, automation, robot assistants, iot, cloud and big data.\" alt=\"Smart industry 4.0 concept, Person use tablet with virtual screen of physical system, smart industrial revolution, automation, robot assistants, iot, cloud and big data.\" class=\"elementor-animation-float\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe07c34 elementor-widget elementor-widget-heading\" data-id=\"fe07c34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">IoT &amp; Product Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1b4360 elementor-widget elementor-widget-text-editor\" data-id=\"d1b4360\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Securing IoT and OT systems by identifying and eliminating vulnerabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1de32d5 elementor-widget elementor-widget-the7_button_widget\" data-id=\"1de32d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/penetration-tests\/iot-digitale-produkte-iec-62443\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a595f88 e-con-full elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile e-flex e-con e-child\" data-id=\"a595f88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef74318 elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile e-flex e-con-boxed e-con e-child\" data-id=\"ef74318\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c2997b e-con-full e-flex e-con e-parent\" data-id=\"7c2997b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet_extra&quot;,&quot;tablet&quot;,&quot;mobile_extra&quot;,&quot;mobile&quot;]}\">\n\t\t<div class=\"elementor-element elementor-element-16dfd7c e-con-full e-flex e-con e-child\" data-id=\"16dfd7c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3eef1aa elementor-widget elementor-widget-heading\" data-id=\"3eef1aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d8a1e2 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget\" data-id=\"3d8a1e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_icon_box_grid_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-3d8a1e2\">\t\t\t<div class=\"dt-css-grid\">\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<div class=\"the7-icon-box-grid\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-icon-div\" aria-label=\"Technical Consulting\">\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t<a aria-label=\"Technical Consulting\">\t\t\t\t\t\t\t\t\t\t\t\tTechnical Consulting\t\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<div class=\"the7-icon-box-grid\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-icon-div\" aria-label=\"Security Architecture and Design\">\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t<a aria-label=\"Security Architecture and Design\">\t\t\t\t\t\t\t\t\t\t\t\tSecurity Architecture and Design\t\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<div class=\"the7-icon-box-grid\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-icon-div\" aria-label=\"Security Testing\">\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t<a aria-label=\"Security Testing\">\t\t\t\t\t\t\t\t\t\t\t\tSecurity Testing\t\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<div class=\"the7-icon-box-grid\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-icon-div\" aria-label=\"Advanced Security Test\">\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t<a aria-label=\"Advanced Security Test\">\t\t\t\t\t\t\t\t\t\t\t\tAdvanced Security Test\t\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<div class=\"the7-icon-box-grid\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-icon-div\" aria-label=\"OT-Security\">\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t<a aria-label=\"OT-Security\">\t\t\t\t\t\t\t\t\t\t\t\tOT-Security\t\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell shown\">\n\t\t\t\t\t\t<div class=\"the7-icon-box-grid\">\t\t\t\t\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-icon-div\" aria-label=\"Digital forensics &amp; incident response\">\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"box-heading\">\n\t\t\t\t\t\t\t\t\t\t\t<a aria-label=\"Digital forensics &amp; incident response\">\t\t\t\t\t\t\t\t\t\t\t\tDigital forensics &amp; incident response\t\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6d961a elementor-mobile-align-center elementor-widget__width-auto elementor-widget elementor-widget-the7_button_widget\" data-id=\"d6d961a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/leistungen\/cyber-security\/\" class=\"box-button elementor-button elementor-size-xl\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b738fd e-flex e-con-boxed e-con e-parent\" data-id=\"0b738fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f4d26e elementor-fixed e-transform elementor-widget elementor-widget-button\" data-id=\"7f4d26e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;,&quot;sticky&quot;:&quot;bottom&quot;,&quot;sticky_offset&quot;:10,&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-90,&quot;sizes&quot;:[]},&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_opacity_effect&quot;:&quot;yes&quot;,&quot;motion_fx_opacity_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:20}},&quot;motion_fx_opacity_direction&quot;:&quot;out-in&quot;,&quot;motion_fx_opacity_level&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet_extra&quot;,&quot;tablet&quot;,&quot;mobile_extra&quot;,&quot;mobile&quot;],&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet_extra&quot;,&quot;tablet&quot;,&quot;mobile_extra&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0,&quot;_transform_rotateZ_effect_laptop&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet_extra&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile_extra&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/smarttecs.com\/en\/cyber-security\/services\/penetration-tests\/pentest-quote-calculator\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shopping-cart\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M528.12 301.319l47.273-208C578.806 78.301 567.391 64 551.99 64H159.208l-9.166-44.81C147.758 8.021 137.93 0 126.529 0H24C10.745 0 0 10.745 0 24v16c0 13.255 10.745 24 24 24h69.883l70.248 343.435C147.325 417.1 136 435.222 136 456c0 30.928 25.072 56 56 56s56-25.072 56-56c0-15.674-6.447-29.835-16.824-40h209.647C430.447 426.165 424 440.326 424 456c0 30.928 25.072 56 56 56s56-25.072 56-56c0-22.172-12.888-41.332-31.579-50.405l5.517-24.276c3.413-15.018-8.002-29.319-23.403-29.319H218.117l-6.545-32h293.145c11.206 0 20.92-7.754 23.403-18.681z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quotation calculator<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Sie befinden sich hier: Start Penetration Tests Security analysis of your systems and products Offensive security. Minimize risks. Our approach to IT security is based on carefully conducted, simulated attacks. We test your IT infrastructure or analyze your software products to precisely evaluate the existing level of security. Our goal is to strengthen your security&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":8161,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-microsite.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-8189","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages\/8189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/comments?post=8189"}],"version-history":[{"count":4,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages\/8189\/revisions"}],"predecessor-version":[{"id":10090,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages\/8189\/revisions\/10090"}],"up":[{"embeddable":true,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages\/8161"}],"wp:attachment":[{"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/media?parent=8189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}