IT Security Testing – Penetration Testing

Hands on a Laptop with Development Code

We are your reliable partner for penetration testing of your software devices and infra­structures

Top Expertise in IT Security

Our team consists of certified IT security spe­cia­lists and experienced software engineers – so they know how to comply with all legal and normative requirements for IT security. ​​​​​​​​​​​​​
​​​​​​​

Certainty for Audits and Approvals

There is no need to sweat when audits and re­views are pending – with us, you get the highest standards for all the necessary security tests and re­ports, and you can be sure that you will meet the expectations of the relevant authorities and notified bodies.

Secure Software Devices and Positive Image

Our experts ensure that you develop IT-secure devices. That means less stress and fewer prob­lems with critical data loss, reportable incidents, and damage to your company's image.  

Reliable and Quick Project Management

You can sit back and relax: Our team takes over the entire project manage­ment and guarantees fast response times and implementation. You will receive a final report to add to your cyber­security file.

Man Showing two Colleagues Something on a Laptop

Let us detect and fix security vulnerabilities early on so you can launch your devices quickly and safely

Manufacturers of medical devices that include software and any data inter­face are required by law to comply with the requirements of IEC 81001-5-1 and MDCG 2019-16 for the cyber­security lifecycle process. These include conducting targeted security tests – usually penetration tests. 

Our experts simulate cyberattacks on your software-based devices and infrastructures during a pen test. This helps us uncover security vulne­ra­bilities that real attackers could exploit. 

Man Presenting Something to Colleagues on a Whiteboard

Protect company and patient data effectively: Play it safe with our penetration testing

Our team regularly conducts pen tests for the following components, among others:

  • Cloud and Network Infrastructures
  • Web Applications
  • APIs
  • Mobile Apps
  • Operating Systems
  • Hardware (USB, Bluetooth, WiFi, etc.) 

Our expert team will guide you through the four phases of the IT security assessment

01

Scope of the Project

We collect the neces­sary infor­ma­tion about the system under test (SUT) and select the appropriate test cases for your device.
02

Conducting a Pen Test and Presen­ting the Results

We test your device according to the applicable require­ments of the autho­rities, such as the BSI or FDA, and follow established guides and frameworks for maximum confor­mity. You will receive a detailed report, which we will use to discuss the identified vulne­rabilities and how to fix them.
03

Fixing Vulnerabilities and Conducting Re-Pentest

We work with you to define mea­sures to close the identified security gaps and improve your devices. We retest after device improvement to verify that the security vulnera­bilities have been closed.
04

Final Report for your Cybersecurity File

You will receive a final report descri­bing the test procedure in accor­dance with internationally recog­nized standards and confirming that there are no longer any vulne­rabilities.

Get in touch so we can start planning your pen test as soon as possible.  

 

Contact us, we're happy to help!
Phone Icon

Phone

+49 7531 94500 20

Contact Form Icon

Contact Form

Feedback of our Customers

slide left
The Johner Institute supported us along our successful FDA 510(k) application with threat modeling and technical pen­tests. They showed great exper­tise and provided very useful answers to our questions and best practices. The cooperation and communi­cation were smooth throughout the process.
Manuel Eckarth, Roclub GmbH
The Johner Institute is the per­fect partner for IT security. With their expert support, latest testing methods, and efficient solution approa­ches, we were able to improve the IT security of our medical software by performing penetration tests. The team has a high level of expertise, covering a wide range of software solutions and spe­cial requirements for artificial intelligence. We are completely satisfied and can recommend this service of the Johner Institute.
Susanne Rumreich, Fotofinder GmbH
I want to express my warmest appreciation for the exceptional work of Giancarlo Florit as a security engineer. I had a chance to work with him twice during the security testing activities for our customer. Giancarlo demonstrated excep­tional knowledge in the medical device security testing following international standards and best security practices. We were faced with the situation to test the SaMD in accordance with secu­rity applicable standards and additionally comply with local Malaysian regulations and requirements. Giancarlo was willing to assist with the tests as well as the documentation required. Giancarlo was faced with testing the medical software taking into account GDPR/HIPAA and spe­ci­fic Malaysian PDP act as well as integrating the security risk-based approach into his prac­tice. Giancarlo was always in touch with the development team requests and was able to react really quickly to the changes. He was very proactive, well organized, and willing to assist even if it required more than it was expected at the beginning. He showed excep­tional communication skills that let us build strong and friendly relationships between Andersen, the Johner Institute, and other stake­holders. I recommend working with the Johner Institute as this is a really professional company with an appropriate well-educated staff. I surely hope to work with Giancarlo as well as with other team members from the Johner Institute on any future projects.
Lizaveta Hrabtsevich, Andersen Lab
slide right

Everything from a single source: Compre­hensive support for your software devices

Cybersecurity File

Our experts help you pass the approval, audits, and reviews quickly and safely with a legally compliant cybersecurity file.     

 

Software Development/Approval

We support you in optimizing your deve­lop­ment process, classifying your soft­ware, and creating all the necessary approval documents. 

 

X

Privacy settings

We use cookies on our websites. Some of them are essential, while others help us to improve this website and your experience.