Have a pentest performed

Discover where your organization is truly vulnerable

  • Manually tested - no false positives

  • Grey box standard, OT experience available

  • Retest included after remediation


Compliance reports state what is correct on paper. A pentest shows what an attacker can actually do in practice.

DEFION performs penetration tests for organizations where downtime, data loss, or reputational damage is not an option. Independent, without vendor lock-in, by senior ethical hackers with years of practical experience.

One vulnerability is enough

Attackers do not look for all weak spots. They look for one entry point.

Many organizations rely on compliance, tooling, or internal controls - and discover too late that the actual resilience is different than assumed. A pentest makes that difference visible before someone else does.

A DEFION pentest gives you insight into:

  • Which vulnerabilities exist and how they can concretely be exploited
  • Which attack paths an attacker can follow - including combined attacks
  • What the impact is on your business operations, data, and reputation
  • Which improvement actions deserve priority for security, IT, and development teams

Our approach: manual, methodical, context-driven

Automated tools find known patterns. Our specialists find what tools miss. DEFION pentests are largely performed manually. Our ethical hackers use experience, logic, and creativity to provide a realistic picture of vulnerabilities that an attacker could actually exploit. All output from automated tooling is manually verified - no false positives in your report.

Our standard is grey-box: we test from the perspective of both an unauthenticated and an authenticated user. This provides the most realistic view of your attack surface. Findings are assessed against established standards such as OWASP Top-10 and NCSC guidelines, supplemented with DEFION's own research experience built up over more than twenty years of pentesting. This guarantees that all known vulnerabilities are always checked.

What a DEFION pentest concretely delivers to you

  • Realistic attack simulation by experienced ethical hackers
  • Insight into vulnerabilities and how they can be combined or exploited
  • Risk prioritization based on your specific business context and impact
  • Report at both technical and management levels — without unnecessary noise
  • Concrete improvement actions, directly applicable for your teams
  • Re-test after remediation possible — so you can be sure it is closed
Guy 1

20+ years of penetration testing in practice

DEFION (originating from Computest Security and Incide) has been conducting penetration tests for organizations in critical sectors for more than two decades. That experience is present in every test - not only in the method but in the judgment of the specialist behind the keyboard.

Our ethical hackers hold recognized certifications including OSCP, OSWE & OSEP. All specialists have a Certificate of Conduct and are bound by strict confidentiality.

500
PENETRATION TESTS
ANNUALLY
OBJECTIVE
SATISFIED
CUSTOMERS
EXPERIENCED
ETHICAL
HACKERS

Which pentest suits your situation?

Depending on your IT landscape and objectives, we perform different types of tests:

Web Application Pentest

Thorough testing of web applications and APIs according to OWASP and CVSS. Grey-box as standard, black- or white-box on request. For organizations with customer portals, SaaS products, or critical web environments.

Internal Pentest

Simulation of an attacker who is already inside - via a compromised employee, supplier, or device. The Active Directory is assessed for permission structure, presence of weak passwords, and possibilities for lateral movement. Additionally, we perform an assessment of the Microsoft 365 environment (configuration, access rights, and possible data exposure), the WiFi networks and virtual workplaces such as Citrix and thin clients, and the hardening of workstations and laptops based on best practices.

External Pentest

Attack simulation from the perspective of an external attacker. What is visible from the internet, which services are unintentionally accessible, and what can an attacker achieve with that? Including Leaked Credentials Analysis - are your employees' passwords from previous data breaches still usable?

OT Pentest

Controlled attack simulation on industrial environments and process control. DEFION has specifically adapted the test methodology for OT environments - to minimize impact on availability and correct operation. Prior to the test, DEFION discusses all risks with your team. Test scenarios are tailored to your specific architecture: network segmentation, authentication, supplier access, and secured components.

Cloud Security Assessment

Assessment of your cloud environment on Identity & Access Management, network security, storage configuration, security monitoring, and compliance. Including consultation with your cloud administrator to put findings into context.

Red Team Engagement

Advanced, scenario-driven attack simulation focused on your full detection and response capability. Not only technical vulnerabilities — also people, processes, and physical access.

During the intake, we determine together which approach is appropriate.

Objects

How a pentest at DEFION proceeds

  1. Scope & intake: We determine objectives, systems, and conditions together. The security specialist creates a test plan with exact scope, IP addresses, URLs, and attack perspective.

  2. Testing phase — Manual attack simulation by an experienced ethical hacker. Methodical and controlled — within the agreed scope, with attention to operational continuity.

  3. Reporting & prioritization — Clear report with findings at both technical and management levels. Risks prioritized based on business impact. No generic list — but directly applicable insights.

  4. Report discussion — Personal explanation of the findings by the executing specialist. So your team understands what was found and what should be addressed first.

  5. Validation — After remediation, we retest the mitigations. So you can be sure the vulnerability is actually closed.

"With DEFION we have made enormous progress. The sense of control is greater. The specialists are very technical and passionate about their field. This clearly shows in their services." FuturumShop, e-commerce client

AFAS actively defended 24/7 by DEFION
"Thanks to DEFION, we benefit from up-to-date knowledge about contemporary security threats and means to avert risks. We have peace of mind knowing we are fully supported 24/7 by their team.”
Jeroen van Stokkum
Manager ICT
Read the story
AFAS actively defended 24/7 by DEFION
Avy partners with DEFION to safeguard sensitive drone data
“The sector and the partners we work with maintain increasingly high security standards for IoT-products and services. Protecting the privacy of individuals in the images and the sensitivity of the information the drones collect, such as on objects in critical infrastructure, requires our security to be airtight. With Defion, we are working with a professional partner who can support us at the right level. The collaboration also fits perfectly within our strategy to deliver reliable and secure drone technology to European customers.”
Read the story
NAD Water Control partners with DEFION to ensure NIS2 compliance for OT
“New requirements from NIS2 for OT systems are increasing the focus on security. With Defion, we know we have the right expertise in-house to keep our systems secure. The collaboration was easy and pleasant; the specialists truly sat next to us rather than across from us. Thanks to their openness and expertise, we are working together toward the same goal: optimal security. This gives us the confidence to face the future.”
Read the story
FuturumShop boosts cyber resilience with DEFION as full-service security partner
“If you look at where we were ten years ago, we’ve made enormous progress. The sense of control is greater. With Security Assurance and MDR we have set up processes and control mechanisms that allow us to limit the impact of a potential attack. The collaboration also serves as a constant reminder to maintain focus on security and set the right priorities in that area. It keeps us alert and sharp. Moreover, Defion’s specialists are highly technical and passionate about their field. That clearly shows in their services.”
Read the story

For which organizations do we perform pentests?

Our pentests are performed for all kinds of organizations in various sectors:

  • With business-critical IT environments
  • In highly regulated sectors, such as critical infrastructure, finance, and government
  • With in-house development teams
  • That want certainty instead of assumptions
Do you want to know where your organization is truly vulnerable? Contact us directly.
Comp 1

Frequently Asked Questions

What is the difference between a pentest and a vulnerability assessment?

A vulnerability assessment broadly maps vulnerabilities. A pentest goes further: our ethical hackers actually try to exploit vulnerabilities to determine what an attacker can achieve. Both have their value - during the intake we advise which approach fits best.

What is the difference between grey-box, black-box, and white-box?

In black-box, the tester starts without prior knowledge — like an external attacker. In white-box, the tester has full access to documentation and source code. Grey-box is in between and generally provides the most realistic and efficient view. DEFION standardly chooses grey-box, unless your situation requires otherwise.

How long does a pentest take?

A targeted web application pentest typically takes 3–5 days. A comprehensive internal pentest or red team engagement can take several weeks. We align the duration with your schedule and objectives.

Can a pentest be used for NIS2 or ISO 27001?

Yes. A pentest provides demonstrable technical evidence of your security level - relevant for both NIS2 compliance and ISO 27001 certification and DORA requirements.

Does DEFION also perform OT pentests?

Yes, with an adapted methodology that specifically takes into account the availability and vulnerability of industrial systems. We always discuss the risks with your team in advance.

How much does a pentest cost?

The costs depend on scope, type of test, and complexity. Contact us for a tailored indication — usually we can provide an initial estimate within one working day.

An initial estimate within one working day

Schedule a scope discussion

Related services

Turn 24/7 security monitoring into real response capability.

Speak with our experts and learn how rapid, expert-led response transforms your security posture.

Contact us