Penetration Tests

Put your organization through a cyberattack by our hackers. We will describe the vulnerabilities in a detailed report with recommendations for remediation.

Solution description

Our hackers will test at the network and application level the ability of your systems to withstand real cyber-attacks from the external environment, but also the ability to withstand unauthorized interference from your employees.

We can help you uncover flaws in your system design and architecture and identify underperforming elements of your system. We will verify the level of assurance of confidentiality, integrity and availability of data processed by electronic systems, thus ensuring the smooth operation of the organisation's ICT and related business processes.

Select a penetration test

We are able to implement tests individually and in any combination.

Case study from the banking industry

A foreign-owned Czech bank requested penetration testing of its internet and mobile banking. After an initial analysis of the bank's environment, we proposed extending the tests to other banking applications and verifying a wider range of possible attacks.

Within just 2 hours, we were able to get into the bank's internal network through several applications and gain full access to it. On terminals providing information to customers at branches, we were even able to complete this security breach within 15 minutes, during normal operation. The breach was very quick due to a number of bugs in the applications used. So, we suggested modifying them to withstand possible attacks and to prevent the bank from having to replace them with others.

Due to the number of errors, IT management subsequently asked us to find out if there had been any attacks on the network in the past that they had no knowledge of and that could lead to the theft of customer data. Fortunately, there was no evidence that such an attack had occurred. The bank has not only verified that its critical data has not been compromised, but thanks to the security changes that have been applied, this should no longer be the case.


  • More than 30 years of experience in the field of security in the Czech and Slovak Republics.
  • A wide team of certified specialists with experience from hundreds of penetration tests of critical applications and large-scale systems.
  • We emphasize a manual approach to testing, which results in the discovery of a greater number of errors, especially in the business logic of applications.
  • Evaluating the company's ICT security level and defining the real risks in the context of the expected impact on the business.


Are you interested in more information or an offer for your specific situation?

By submitting the form, I declare that I have familiarized myself with the information on the processing of personal data in ARICOMA.