Data Protection

Information Security

External Data Protection Officer
External Information Security Officer
Penetration Testing

Contributions from
Holzhofer Consulting
self test
Penetration Testing and Vulnerability Assessments
Hackers know (or find) ways to get into your system without authorization (penetration). Our penetration test determines the sensitivity of your systems against such attacks. We check the security of all system components and applications in your network or software with methods that would be used by an attacker. We use attack patterns, which are also used in the wild.

A penetration test gives your company the opportunity to:

  • Identify and locate weaknesses before hackers do
  • Detect bugs, based on misconfiguration
  • Close security holes on technical and organizational level

We would be pleased to make you an individual offer.
Certifications of our experts
  • Data Protection Officer (TÜV)
  • Data Protection Auditor DSA-TÜV
  • Certified Data Protection Officer (udiszert)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • Certified in Risk and Information Systems Control (CRISC)
  • BSI ISO/IEC 27001:2005 Lead Auditor
  • Offensive Security Certified Expert (OSCE)
  • Offensive Security Certified Professional (OSCP)
  • Certified Ethical Hacker (CEH)
  • ITIL Foundation Certified
Foto Martin Holzhofer External Data Protection Officer „Data protection and information security are crucial for every company. Save costs in these challenging areas by an external data protection officer and information security expert. We are pleased to help.“

Martin Holzhofer,
Holzhofer Consulting GmbH
Tel. Holzhofer Consulting GmbH