• Penetrationtests
    • OT, IoT and embedded
    • Kubernetes
    • Cloud & IaaS
    • Network
    • Web apps
    • API
    • ActiveDirectory
    • Cyber Security Assessment
  • Attack simulation
    • Red Teaming
    • Assume Breach
    • CASMART
    • Sensory test
  • HoneyGuard360
  • Trainings
    • Phishing Awareness
    • Live Hacking Events
    • Workshops for decision-makers and those at risk
    • Specialist training
    • Cyber Ranges
  • About
    • About us
    • Career
    • Blog
    • FAQ
    • Glossary
    • Press
Contact
  • de
  • en
    • Overview
    • OT, IoT and embedded
    • ActiveDirectory
    • Kubernetes
    • Web apps
    • Cloud & IaaS
    • Network
    • API
    • Cyber Security Assessment
    • Overview
    • Red Teaming
    • Assume Breach
    • CASMART
    • Sensory test
  • HoneyGuard360
    • Overview
    • Phishing Awareness
    • Live Hacking Events
    • Workshops for decision-makers and those at risk
    • Specialist training
    • Cyber Ranges
    • About us
    • Career
    • Blog
    • FAQ
    • Glossary
    • Press
Contact
  • de
  • en

Penetrationtests

  • OT, IoT & Embedded
  • Kubernetes
  • Cloud & IaaS
  • Network
  • Web apps
  • API
  • ActiveDirectory
  • Cyber Security Assessment

AttackSimulations

  • Red Teaming
  • CASMART
  • Sensory test

Trainings

  • Phishing Awareness
  • Live Hacking Events
  • Decision-maker and
    Vulnerability workshops
  • Specialist training
  • Cyber Ranges

Further information

  • About us
  • Contact
  • Honeyguard360
  • Career
  • FAQ
  • Blog
  • Glossary
  • Imprint
  • Data protection

Laokoon SecurITy
Cookie Consent
To provide you with an optimised experience, we use technologies such as cookies to store and/or access device information. If you consent to these technologies, we may process data such as browsing behaviour or unique IDs on this website. If you do not give or withdraw your consent, certain features and functions may be impaired.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service expressly requested by the subscriber or user or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that have not been requested by the subscriber or user.
Statistics
Technical storage or access for statistical purposes only. Technical storage or access used solely for anonymous statistical purposes. Without a subpoena, the voluntary consent of your Internet service provider or additional records from third parties, the information stored or accessed for this purpose alone cannot generally be used to identify you.
Marketing
The technical storage or access is necessary to create user profiles, to send advertising or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View settings
{title} {title} {title}