{"id":4118,"date":"2023-10-01T15:35:18","date_gmt":"2023-10-01T13:35:18","guid":{"rendered":"https:\/\/www.bayootec.com\/unkategorisiert\/pentesting\/"},"modified":"2025-01-24T15:53:17","modified_gmt":"2025-01-24T14:53:17","slug":"pentesting","status":"publish","type":"post","link":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/","title":{"rendered":"Pentesting"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:100px;--awb-padding-right:15%;--awb-padding-bottom:100px;--awb-padding-left:15%;--awb-padding-top-medium:0px;--awb-padding-bottom-medium:0px;--awb-padding-top-small:0px;--awb-padding-right-small:0px;--awb-padding-bottom-small:0px;--awb-padding-left-small:0px;--awb-margin-top:-60px;--awb-margin-bottom:0px;--awb-margin-top-small:-60px;--awb-background-color:var(--awb-color1);--awb-background-color-small:var(--awb-color1);--awb-background-image:url(&quot;https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-mehr-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-flex-end fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_5 2_5 fusion-flex-column fusion-animated\" style=\"--awb-padding-top-small:0px;--awb-padding-bottom-small:0px;--awb-padding-left-small:0px;--awb-bg-color-small:var(--awb-color1);--awb-bg-color-small-hover:var(--awb-color1);--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:70px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:70px;--awb-spacing-left-large:0%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:1;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"1.3\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element sm-text-align-center fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-aspect-ratio:21 \/ 9;--awb-object-position:45% 15%;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none has-aspect-ratio\"><img decoding=\"async\" width=\"1200\" height=\"800\" alt=\"BAYOOTEC - Pentesting f\u00fcr eine h\u00f6here Cybersecurity - Wir testen deine Software auf Sicherheitsl\u00fccken\" title=\"BAYOOTEC &#8211; Pentesting f\u00fcr eine h\u00f6here Cybersecurity &#8211; Wir testen deine Software auf Sicherheitsl\u00fccken\" src=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg\" class=\"img-responsive wp-image-4092 img-with-aspect-ratio\" data-parent-fit=\"cover\" data-parent-container=\".fusion-image-element\" srcset=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken-200x133.jpg 200w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken-400x267.jpg 400w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken-600x400.jpg 600w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken-800x533.jpg 800w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 600px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-div\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:20px;--awb-margin-top-small:10px;--awb-margin-right-small:4vw;--awb-margin-bottom-small:10px;--awb-margin-left-small:4vw;--awb-sep-color:var(--awb-color5);\"><div class=\"fusion-title-heading title-heading-left title-heading-tag fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography3-font-family);font-weight:var(--awb-typography3-font-weight);font-style:var(--awb-typography3-font-style);margin:0;text-transform:uppercase;--fontSize:17;line-height:1.82;\">Our services<\/div><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:40px;--awb-margin-top-small:10px;--awb-margin-right-small:4vw;--awb-margin-bottom-small:10px;--awb-margin-left-small:4vw;--awb-font-size:80px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography1-font-family);font-weight:var(--awb-typography1-font-weight);font-style:var(--awb-typography1-font-style);margin:0;letter-spacing:var(--awb-typography1-letter-spacing);font-size:1em;--fontSize:80;line-height:var(--awb-typography1-line-height);\">Pentesting<\/h1><\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:45px;--awb-margin-bottom-medium:45px;--awb-margin-top-small:25px;--awb-margin-right-small:4vw;--awb-margin-bottom-small:45px;--awb-margin-left-small:4vw;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"217\" height=\"35\" alt=\"BAYOOTEC - Softwareentwicklung von Enterprise Software\" title=\"BAYOOTEC &#8211; Softwareentwicklung von Enterprise Software-green\" src=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/07\/BAYOOTEC-Softwareentwicklung-von-Enterprise-Software-green.svg\" class=\"img-responsive wp-image-3019\"\/><\/span><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-div\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:40px;--awb-margin-top-small:10px;--awb-margin-right-small:4vw;--awb-margin-bottom-small:10px;--awb-margin-left-small:4vw;--awb-font-size:24px;\"><div class=\"fusion-title-heading title-heading-left title-heading-tag fusion-responsive-typography-calculated\" style=\"font-family:&quot;Rubik&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:24;line-height:1.7;\">  We hack before others do<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:150px;--awb-padding-bottom:120px;--awb-padding-top-medium:49px;--awb-padding-right-medium:9%;--awb-padding-bottom-medium:49px;--awb-padding-left-medium:9%;--awb-padding-top-small:39px;--awb-padding-right-small:11%;--awb-padding-bottom-small:80px;--awb-padding-left-small:11%;--awb-margin-top-small:0px;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:calc( 1300px + 40px );margin-left: calc(-40px \/ 2 );margin-right: calc(-40px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_5 2_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:calc( 0.025 * calc( 100% - 40px ) );--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0.025 * calc( 100% - 40px ) );--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:calc( 0.025 * calc( 100% - 40px ) );--awb-spacing-left-medium:calc( 0 * calc( 100% - 40px ) );--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography1-font-size);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography1-font-family);font-weight:var(--awb-typography1-font-weight);font-style:var(--awb-typography1-font-style);margin:0;font-size:1em;--fontSize:46;line-height:1.2;\"><h2>Pentesting for higher <span class=\"highlight-babyblue\">cybersecurity<\/span><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography4-font-size);--awb-line-height:var(--awb-typography4-line-height);--awb-letter-spacing:var(--awb-typography4-letter-spacing);--awb-text-transform:var(--awb-typography4-text-transform);--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:40px;--awb-text-font-family:var(--awb-typography4-font-family);--awb-text-font-weight:var(--awb-typography4-font-weight);--awb-text-font-style:var(--awb-typography4-font-style);\"><p>Hacker attacks are especially risky when sensitive information and data are involved. In pentests, we consciously search for security vulnerabilities in IT systems <strong>before hackers identify and exploit them.<\/strong> <\/p>\n<p>The goal of pentesting is to identify these gaps at an early stage and thus develop quick solutions.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:calc( 0.016666666666667 * calc( 100% - 40px ) );--awb-margin-bottom-large:-80px;--awb-spacing-left-large:calc( 0.083333333333333 * calc( 100% - 40px ) );--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:calc( 0 * calc( 100% - 40px ) );--awb-spacing-left-medium:calc( 0.083333333333333 * calc( 100% - 40px ) );--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-3 fusion-content-boxes-1 content-boxes-icon-on-side content-left\" style=\"--awb-iconcolor:var(--awb-color5);--awb-item-margin-bottom:4%;--awb-hover-accent-color:var(--awb-color5);--awb-circle-hover-accent-color:transparent;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);--awb-content-padding-left:60px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-lock fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);padding-left:60px;\">Always remain in control<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Pentesting can significantly reduce the risk of data loss and financial damage. An important aspect of pentesting is to always maintain control over your own systems and networks. Active attack simulations can be used to test control mechanisms and response capabilities to potential attacks. This allows you to learn in a controlled environment how your organization can properly respond to and defend against threats.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);--awb-content-padding-left:60px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-server fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);padding-left:60px;\">Protect internal, sensitive data<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Internal, sensitive organization data is often the main target of cybercrime because it has significant value. Through our pentesting, we not only identify enterprise cybersecurity vulnerabilities, we also close those vulnerabilities. This helps to maintain integrity and confidentiality and strengthens the trust of your customers and partners.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);--awb-content-padding-left:60px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-gavel fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);padding-left:60px;\">Comply with compliance requirements<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Many industries and government bodies require organizations to have their security mechanisms and procedures audited on a regular basis. By performing pentests, you can ensure that your company meets the required standards and minimize potential, legal and financial risks.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:100px;--awb-padding-right:0px;--awb-padding-bottom:100px;--awb-padding-left:0px;--awb-padding-top-medium:90px;--awb-padding-right-medium:9%;--awb-padding-bottom-medium:90px;--awb-padding-left-medium:9%;--awb-padding-top-small:50px;--awb-padding-right-small:14%;--awb-padding-bottom-small:50px;--awb-padding-left-small:14%;--awb-margin-top-small:0px;--awb-background-color:var(--awb-color1);--awb-background-image:url(&quot;https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/08\/BAYOOTEC-Wir-entwickeln-Software-Corporate-Websites-Apps-Automatisierung-datengetriebene-Anwendungen.svg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1300px + 70px );margin-left: calc(-70px \/ 2 );margin-right: calc(-70px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top-small:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:calc( 0.01 * calc( 100% - 70px ) );--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0.01 * calc( 100% - 70px ) );--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography1-font-size);\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:46;line-height:1.2;\"><h2><strong>Be safe with pentesting<\/strong><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color1);\"><p>The number of cyber attacks has been rising for years. <a style=\"color: #ffffff\" href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Oeffentliche-Verwaltung\/Sicherheitspruefungen\/Pen_Test_und_IS_Webcheck\/pent-tests-und-is-webcheck_node.html\" target=\"_blank\" rel=\"noopener\"><u><b>This is why the German Federal Office for Information Security (BSI) also recommends pentesting<\/b><\/u><\/a>to check the current security of IT systems. It is important that the tests are scheduled on a regular basis.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:120px;--awb-padding-bottom:40px;--awb-padding-top-medium:57px;--awb-padding-right-medium:9%;--awb-padding-bottom-medium:0px;--awb-padding-left-medium:9%;--awb-padding-top-small:52px;--awb-padding-right-small:11%;--awb-padding-bottom-small:0px;--awb-padding-left-small:11%;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:calc( 1300px + 40px );margin-left: calc(-40px \/ 2 );margin-right: calc(-40px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top-small:0px;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:20px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-div\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:20px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-sep-color:var(--awb-color5);\"><div class=\"fusion-title-heading title-heading-left title-heading-tag fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography3-font-family);font-weight:var(--awb-typography3-font-weight);font-style:var(--awb-typography3-font-style);margin:0;text-transform:uppercase;--fontSize:17;line-height:1.82;\">Various tests for different fields<\/div><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography1-font-size);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography1-font-family);font-weight:var(--awb-typography1-font-weight);font-style:var(--awb-typography1-font-style);margin:0;font-size:1em;--fontSize:46;line-height:1.2;\"><h2>This is how we run pentests<\/h2><\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_4_5 4_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top-small:0px;--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:20px;--awb-margin-bottom-large:60px;--awb-spacing-left-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1600\" height=\"727\" alt=\"BAYOOTEC - So f\u00fchren wir Pentests durch, um die IT-Security Deines Unternehmens zu erh\u00f6hen\" title=\"BAYOOTEC &#8211; So f\u00fchren wir Pentests durch, um die IT-Security Deines Unternehmens zu erh\u00f6hen\" src=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-So-fuehren-wir-Pentests-durch-um-die-IT-Security-Deines-Unternehmens-zu-erhoehen.jpg\" class=\"img-responsive wp-image-4080\" srcset=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-So-fuehren-wir-Pentests-durch-um-die-IT-Security-Deines-Unternehmens-zu-erhoehen-200x91.jpg 200w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-So-fuehren-wir-Pentests-durch-um-die-IT-Security-Deines-Unternehmens-zu-erhoehen-400x182.jpg 400w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-So-fuehren-wir-Pentests-durch-um-die-IT-Security-Deines-Unternehmens-zu-erhoehen-600x273.jpg 600w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-So-fuehren-wir-Pentests-durch-um-die-IT-Security-Deines-Unternehmens-zu-erhoehen-800x364.jpg 800w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-So-fuehren-wir-Pentests-durch-um-die-IT-Security-Deines-Unternehmens-zu-erhoehen-1200x545.jpg 1200w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-So-fuehren-wir-Pentests-durch-um-die-IT-Security-Deines-Unternehmens-zu-erhoehen.jpg 1600w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top-small:0px;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:20px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography4-font-size);--awb-line-height:var(--awb-typography4-line-height);--awb-letter-spacing:var(--awb-typography4-letter-spacing);--awb-text-transform:var(--awb-typography4-text-transform);--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:40px;--awb-text-font-family:var(--awb-typography4-font-family);--awb-text-font-weight:var(--awb-typography4-font-weight);--awb-text-font-style:var(--awb-typography4-font-style);\"><p>We use <strong>a combination of automated tests and manual, explorative procedures.<\/strong> We combine the speed, repeatability and high throughput of automated testing with the creativity, expertise and combinatorial skills of our cybersecurity engineers.<\/p>\n<p>Meanwhile, we draw on <strong>known databases\/repositories such as NVD (National Vulnerability Database) of the U.S. government or CVE (Common Vulnerabilities and Exposures) U.S. Department of Homeland Security<\/strong>, to identify possible vulnerabilities. With our many years of experience in the field of software development <strong>to the highest IT security standards<\/strong>, we design test and attack scenarios tailored to your software. This allows us to check possible attack vectors (one attack path) or attack surfaces (multi-stage attack methods).<\/p>\n<p>As a result, every vulnerability found is<strong> evaluated using the Common Vulnerability Scoring System (CVSSv3)<\/strong> and provided with possible mitigation measures, including the degree of effectiveness.<br \/> In other words, <strong>you get a quick overview of the security status of your software<\/strong> and can use this to improve it.<\/p>\n<p>We check the corresponding applications (Web\/WebApps\/Apps) for security risks during our pentests. This sometimes includes front-end and back-end, but also web services, APIs and other components.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_5 2_5 fusion-flex-column fusion-flex-align-self-flex-end\" style=\"--awb-overflow:hidden;--awb-bg-size:cover;--awb-border-radius:6px 6px 6px 6px;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:calc( 0.025 * calc( 100% - 40px ) );--awb-margin-bottom-large:40px;--awb-spacing-left-large:calc( 0 * calc( 100% - 40px ) );--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Beim-Pentesting-bewerten-wir-Sicherheitsluecken-gemaess-CVSS-Score.jpg\" target=\"_blank\" aria-label=\"BAYOOTEC &#8211; Beim Pentesting bewerten wir Sicherheitsl\u00fccken gem\u00e4\u00df CVSS Score\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1600\" height=\"770\" alt=\"BAYOOTEC - Beim Pentesting bewerten wir Sicherheitsl\u00fccken gem\u00e4\u00df CVSS Score\" src=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Beim-Pentesting-bewerten-wir-Sicherheitsluecken-gemaess-CVSS-Score.jpg\" class=\"img-responsive wp-image-4078\" srcset=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Beim-Pentesting-bewerten-wir-Sicherheitsluecken-gemaess-CVSS-Score-200x96.jpg 200w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Beim-Pentesting-bewerten-wir-Sicherheitsluecken-gemaess-CVSS-Score-400x193.jpg 400w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Beim-Pentesting-bewerten-wir-Sicherheitsluecken-gemaess-CVSS-Score-600x289.jpg 600w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Beim-Pentesting-bewerten-wir-Sicherheitsluecken-gemaess-CVSS-Score-800x385.jpg 800w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Beim-Pentesting-bewerten-wir-Sicherheitsluecken-gemaess-CVSS-Score-1200x578.jpg 1200w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Beim-Pentesting-bewerten-wir-Sicherheitsluecken-gemaess-CVSS-Score.jpg 1600w\" sizes=\"(max-width: 1100px) 100vw, 600px\" \/><\/a><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:120px;--awb-padding-bottom:40px;--awb-padding-top-medium:54px;--awb-padding-right-medium:9%;--awb-padding-bottom-medium:0px;--awb-padding-left-medium:9%;--awb-padding-top-small:42px;--awb-padding-right-small:11%;--awb-padding-bottom-small:0px;--awb-padding-left-small:11%;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:calc( 1300px + 40px );margin-left: calc(-40px \/ 2 );margin-right: calc(-40px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top-small:0px;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:calc( 0.083333333333333 * calc( 100% - 40px ) );--awb-margin-bottom-large:0px;--awb-spacing-left-large:20px;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:calc( 0.083333333333333 * calc( 100% - 40px ) );--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography1-font-size);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography1-font-family);font-weight:var(--awb-typography1-font-weight);font-style:var(--awb-typography1-font-style);margin:0;font-size:1em;--fontSize:46;line-height:1.2;\"><h2>These are the vulnerabilities we test for you<\/h2><\/h2><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-2 fusion-columns-total-8 fusion-content-boxes-2 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color5);--awb-item-margin-bottom:4%;--awb-hover-accent-color:var(--awb-color5);--awb-circle-hover-accent-color:transparent;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-shield-alt fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);\">Authorizations<\/h3><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-shield-alt fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);\">Authentications<\/h3><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-shield-alt fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);\">Validations<\/h3><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-shield-alt fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);\">Data security &amp; protection<\/h3><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-shield-alt fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);\">Exception Handling<\/h3><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-6 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-shield-alt fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);\">Process &amp; Application Logic<\/h3><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-7 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-shield-alt fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);\">SSL &amp; TSL<\/h3><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-8 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-none\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span ><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 40px;line-height:normal;font-size:40px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-shield-alt fas circle-no\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:17px;--fontSize:17;line-height:var(--awb-typography1-line-height);\">Dissemination of safety-relevant information<\/h3><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-padding-top-small:0px;--awb-overflow:hidden;--awb-bg-size:cover;--awb-border-radius:6px 6px 6px 6px;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:calc( 0.025 * calc( 100% - 40px ) );--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0.025 * calc( 100% - 40px ) );--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:calc( 0 * calc( 100% - 40px ) );--awb-spacing-left-medium:calc( 0.025 * calc( 100% - 40px ) );--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-margin-bottom-small:48px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"960\" height=\"1200\" alt=\"BAYOOTEC - Pentesting und IT-Security - Wir testen deine Software auf Sicherheitsl\u00fccken\" title=\"BAYOOTEC &#8211; Pentesting und IT-Security &#8211; Wir testen deine Software auf Sicherheitsl\u00fccken\" src=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-und-IT-Security-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg\" class=\"img-responsive wp-image-4076\" srcset=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-und-IT-Security-Wir-testen-deine-Software-auf-Sicherheitsluecken-200x250.jpg 200w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-und-IT-Security-Wir-testen-deine-Software-auf-Sicherheitsluecken-400x500.jpg 400w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-und-IT-Security-Wir-testen-deine-Software-auf-Sicherheitsluecken-600x750.jpg 600w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-und-IT-Security-Wir-testen-deine-Software-auf-Sicherheitsluecken-800x1000.jpg 800w, https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-und-IT-Security-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg 960w\" sizes=\"(max-width: 1100px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:100px;--awb-padding-right:0px;--awb-padding-bottom:100px;--awb-padding-left:0px;--awb-padding-top-medium:90px;--awb-padding-right-medium:9%;--awb-padding-bottom-medium:90px;--awb-padding-left-medium:9%;--awb-padding-top-small:50px;--awb-padding-right-small:14%;--awb-padding-bottom-small:50px;--awb-padding-left-small:14%;--awb-margin-top-small:0px;--awb-background-color:var(--awb-color1);--awb-background-image:url(&quot;https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/08\/BAYOOTEC-Wir-entwickeln-Software-Corporate-Websites-Apps-Automatisierung-datengetriebene-Anwendungen.svg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1300px + 70px );margin-left: calc(-70px \/ 2 );margin-right: calc(-70px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top-small:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:calc( 0.01 * calc( 100% - 70px ) );--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0.01 * calc( 100% - 70px ) );--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography1-font-size);\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:46;line-height:1.2;\"><h2>Synergies are our recipe for success<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color1);\"><p>BAYOOTEC and <a href=\"http:\/\/www.bayoomed.com\" target=\"_blank\" rel=\"noopener\"><u><strong style=\"color: #ffffff\">BAYOOMED<\/strong> <\/u><\/a>&#8211; Many years of experience in software development, not least in safety-critical areas, and IT security meet expertise in the field of medical software. With this cooperation we support you with the comprehensive knowledge of both organizations. <strong>Write us and we will be happy to advise you and talk about the possibilities for more security of your software, medical software, apps and DiGA.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right-medium:9%;--awb-padding-left-medium:9%;--awb-padding-right-small:11%;--awb-padding-left-small:11%;--awb-margin-bottom:80px;--awb-margin-bottom-medium:0px;--awb-margin-bottom-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1365px;margin-left: calc(-5% \/ 2 );margin-right: calc(-5% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top-medium:60px;--awb-padding-right-medium:0px;--awb-padding-bottom-medium:60px;--awb-padding-left-medium:0px;--awb-padding-top-small:0px;--awb-padding-right-small:0px;--awb-padding-bottom-small:30px;--awb-padding-left-small:0px;--awb-bg-position:center bottom;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.375%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.375%;--awb-width-medium:100%;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography1-font-size);\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography1-font-family);font-weight:var(--awb-typography1-font-weight);font-style:var(--awb-typography1-font-style);margin:0;font-size:1em;--fontSize:46;line-height:1.2;\"><h4>Get in touch now<\/h4><\/h4><\/div><div class=\"fusion-text fusion-text-5 fusion-text-no-margin\" style=\"--awb-margin-bottom:40px;--awb-text-font-family:var(--awb-typography4-font-family);--awb-text-font-weight:var(--awb-typography4-font-weight);--awb-text-font-style:var(--awb-typography4-font-style);\"><p>Whether you have a specific software project in mind or you are looking for answers to open questions &#8211; we are here to help you.<br \/>  Arrange a non-binding appointment here.<\/p>\n<\/div><div class=\"fusion-form fusion-form-builder fusion-form-form-wrapper fusion-form-5782 has-icon-alignment\" style=\"--awb-margin-right:0px;--awb-margin-left:0px;--awb-tooltip-text-color:#ffffff;--awb-tooltip-background-color:#333333;--awb-form-bg-color:var(--awb-color1);--awb-form-placeholder-color:var(--awb-color8);--awb-form-text-color:var(--awb-color8);--awb-form-label-color:var(--awb-color8);--awb-form-border-width-top:2px;--awb-form-border-width-bottom:2px;--awb-form-border-width-right:2px;--awb-form-border-width-left:2px;--awb-form-border-color:var(--awb-color8);--awb-form-focus-border-color:var(--awb-color4);--awb-form-focus-border-hover-color:hsla(var(--awb-color4-h),var(--awb-color4-s),var(--awb-color4-l),calc(var(--awb-color4-a) - 50%));--awb-form-border-radius:13px;--awb-icon-alignment-top:2px;--awb-icon-alignment-bottom:2px;--awb-icon-alignment-font-size:1em;\" data-form-id=\"5782\" data-config=\"{&quot;form_id&quot;:5782,&quot;form_post_id&quot;:5782,&quot;post_id&quot;:4118,&quot;form_type&quot;:&quot;ajax&quot;,&quot;confirmation_type&quot;:&quot;message&quot;,&quot;redirect_url&quot;:&quot;&quot;,&quot;redirect_timeout&quot;:&quot;0&quot;,&quot;field_labels&quot;:{&quot;Vorname&quot;:&quot;&quot;,&quot;Nachname&quot;:&quot;&quot;,&quot;E-Mail&quot;:&quot;&quot;,&quot;Telefonnummer&quot;:&quot;&quot;,&quot;Unternehmen&quot;:&quot;&quot;,&quot;DeinAnliegen&quot;:&quot;&quot;,&quot;hiermit_bestatige_ich_dass_ich_mit_der_verarbeitung_meiner_daten_gemas_der_datenschutzerklarung_einverstanden_bin&quot;:&quot;&quot;},&quot;field_logics&quot;:{&quot;Vorname&quot;:&quot;&quot;,&quot;Nachname&quot;:&quot;&quot;,&quot;E-Mail&quot;:&quot;&quot;,&quot;Telefonnummer&quot;:&quot;&quot;,&quot;Unternehmen&quot;:&quot;&quot;,&quot;DeinAnliegen&quot;:&quot;&quot;,&quot;hiermit_bestatige_ich_dass_ich_mit_der_verarbeitung_meiner_daten_gemas_der_datenschutzerklarung_einverstanden_bin&quot;:&quot;&quot;,&quot;notice_1&quot;:&quot;&quot;,&quot;submit_1&quot;:&quot;&quot;},&quot;field_types&quot;:{&quot;Vorname&quot;:&quot;text&quot;,&quot;Nachname&quot;:&quot;text&quot;,&quot;E-Mail&quot;:&quot;email&quot;,&quot;Telefonnummer&quot;:&quot;phone_number&quot;,&quot;Unternehmen&quot;:&quot;text&quot;,&quot;DeinAnliegen&quot;:&quot;textarea&quot;,&quot;hiermit_bestatige_ich_dass_ich_mit_der_verarbeitung_meiner_daten_gemas_der_datenschutzerklarung_einverstanden_bin&quot;:&quot;consent&quot;,&quot;notice_1&quot;:&quot;notice&quot;,&quot;recaptcha_1&quot;:&quot;recaptcha&quot;,&quot;submit_1&quot;:&quot;submit&quot;},&quot;nonce_method&quot;:&quot;ajax&quot;,&quot;form_views&quot;:&quot;&quot;,&quot;form_views_counting&quot;:&quot;&quot;}\"><form action=\"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/\" method=\"post\" class=\"fusion-form fusion-form-5782\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:;--awb-flex-shrink-medium:;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:;--awb-flex-shrink-small:;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"5782\"><input type=\"text\" autocomplete=\"off\"  data-empty-notice=\"Bitte f\u00fclle alle erforderlichen Felder aus.\" name=\"Vorname\" id=\"Vorname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"First name *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:;--awb-flex-shrink-medium:;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:;--awb-flex-shrink-small:;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"5782\"><input type=\"text\" autocomplete=\"off\"  data-empty-notice=\"Bitte f\u00fclle alle erforderlichen Felder aus.\" name=\"Nachname\" id=\"Nachname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Name *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:;--awb-flex-shrink-medium:;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:;--awb-flex-shrink-small:;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-email-field fusion-form-label-above\" style=\"\" data-form-id=\"5782\"><input type=\"email\" autocomplete=\"off\"  data-empty-notice=\"Bitte f\u00fclle alle erforderlichen Felder aus.\" name=\"E-Mail\" id=\"E-Mail\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"E-mail *\" data-holds-private-data=\"false\"\/><\/div><div class=\"fusion-form-field fusion-form-phone-number-field fusion-form-label-above\" style=\"\" data-form-id=\"5782\"><input type=\"tel\" autocomplete=\"off\" name=\"Telefonnummer\" id=\"Telefonnummer\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Phone \" data-holds-private-data=\"false\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"5782\"><input type=\"text\" autocomplete=\"off\"  data-empty-notice=\"Bitte f\u00fclle alle erforderlichen Felder aus.\" name=\"Unternehmen\" id=\"Unternehmen\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Company *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-textarea-field fusion-form-label-above\" style=\"\" data-form-id=\"5782\"><textarea cols=\"40\" autocomplete=\"off\"  minlength=\"0\"  rows=\"4\" tabindex=\"\" id=\"DeinAnliegen\" name=\"DeinAnliegen\" class=\"fusion-form-input\" placeholder=\"Your request \" data-holds-private-data=\"false\"><\/textarea><\/div><div class=\"fusion-form-field fusion-form-consent-field fusion-form-label-above\" style=\"\" data-form-id=\"5782\"><div class=\"fusion-form-checkbox option-inline\"><input tabindex=\"\" id=\"hiermit_bestatige_ich_dass_ich_mit_der_verarbeitung_meiner_daten_gemas_der_datenschutzerklarung_einverstanden_bin\" type=\"checkbox\" value=\"1\" name=\"hiermit_bestatige_ich_dass_ich_mit_der_verarbeitung_meiner_daten_gemas_der_datenschutzerklarung_einverstanden_bin\" class=\"fusion-form-input\" required=\"true\" aria-required=\"true\"\/><label for=\"hiermit_bestatige_ich_dass_ich_mit_der_verarbeitung_meiner_daten_gemas_der_datenschutzerklarung_einverstanden_bin\">I hereby confirm that I agree to the processing of my data in accordance with the privacy policy.<\/label><\/div><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-margin-top:15px;\"><p><strong>We look forward to your request and will get back to you as soon as possible.<\/strong><\/p>\n<\/div><div class=\"form-submission-notices data-notice_1\" id=\"fusion-notices-1\" data-instance=\"1\"><div class=\"fusion-alert alert success alert-success fusion-alert-center fusion-form-response fusion-form-response-success awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-check-circle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">Your request has been sent successfully.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><div class=\"fusion-alert alert error alert-danger fusion-alert-center fusion-form-response fusion-form-response-error awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-exclamation-triangle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">There was a problem sending your request. Please email us at hello@bayootec.com.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><\/div><div class=\"fusion-form-field fusion-form-recaptcha-field fusion-form-label-above\" style=\"\" data-form-id=\"5782\">\t\t\t\t<div class=\"form-creator-recaptcha\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-form-recaptcha-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tid=\"g-recaptcha-id-form-5782\"\n\t\t\t\t\t\t\tclass=\"fusion-form-recaptcha-v3 recaptcha-container \"\n\t\t\t\t\t\t\tdata-sitekey=\"6LeyJTQnAAAAALYh3T82YoR-6m5Hb3lodPc4-KZv\"\n\t\t\t\t\t\t\tdata-badge=\"inline\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"hidden\"\n\t\t\t\t\t\t\tname=\"fusion-form-recaptcha-response\"\n\t\t\t\t\t\t\tclass=\"g-recaptcha-response\"\n\t\t\t\t\t\t\tid=\"fusion-form-recaptcha-response-5782\"\n\t\t\t\t\t\t\tvalue=\"\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:;--awb-flex-shrink-medium:;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:;--awb-flex-shrink-small:;--awb-spacing-right-small:0%;--awb-spacing-left-small:3.84%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7 fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-margin-left:20px;\"><p><a href=\"https:\/\/www.bayootec.com\/en\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">Privacy policy<\/a><\/p>\n<\/div><div class=\"fusion-form-field fusion-form-submit-field fusion-form-label-above\" style=\"\" data-form-id=\"5782\"><div style=\"text-align:left;\"><button type=\"submit\" class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span  button-default form-form-submit\" style=\"--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color5);--button_gradient_bottom_color:var(--awb-color5);--button_gradient_top_color_hover:var(--awb-color4);--button_gradient_bottom_color_hover:var(--awb-color4);\" data-form-number=\"5782\" tabindex=\"\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Submit<\/span><\/button><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-flex-end fusion-no-small-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:;--awb-flex-shrink-medium:;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:2;--awb-flex-grow-small:;--awb-flex-shrink-small:;--awb-spacing-right-small:0%;--awb-spacing-left-small:3.84%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-row\"><div class=\"fusion-text fusion-text-8\"><p><a href=\"https:\/\/www.bayootec.com\/en\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">Privacy policy<\/a><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"fusion_privacy_expiration_interval\" value=\"48\"><input type=\"hidden\" name=\"privacy_expiration_action\" value=\"anonymize\"><\/form><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacker attacks are especially risky when sensitive information and data are involved. That&#8217;s why our principle in cybersecurity is: We hack before anybody else does. We use pentesting to proactively check software for IT security vulnerabilities.<\/p>\n","protected":false},"author":5,"featured_media":4092,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[74,70,75,76,72,71,69,68,73],"class_list":["post-4118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-services","tag-compliance-en","tag-cybersecurity-en","tag-gdpr-en","tag-gdpr-en-2","tag-it-security-en-2","tag-it-security-en","tag-pentest-en","tag-pentesting-en","tag-security-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pentesting - BAYOOTEC<\/title>\n<meta name=\"description\" content=\"Our principle in cybersecurity: We hack before anybody else does. We use pentesting to check software for IT security vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pentesting\" \/>\n<meta property=\"og:description\" content=\"Our principle in cybersecurity: We hack before anybody else does. We use pentesting to check software for IT security vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/\" \/>\n<meta property=\"og:site_name\" content=\"BAYOOTEC\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-01T13:35:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-24T14:53:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anna Lischka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anna Lischka\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"29 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/\"},\"author\":{\"name\":\"Anna Lischka\",\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/#\\\/schema\\\/person\\\/dcf6c9fe61c3c7cb86a53fcc843aebe0\"},\"headline\":\"Pentesting\",\"datePublished\":\"2023-10-01T13:35:18+00:00\",\"dateModified\":\"2025-01-24T14:53:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/\"},\"wordCount\":6775,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bayootec.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/10\\\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg\",\"keywords\":[\"Compliance\",\"Cybersecurity\",\"GDPR\",\"GDPR\",\"IT-Security\",\"IT-Security\",\"Pentest\",\"Pentesting\",\"Security\"],\"articleSection\":[\"Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/\",\"url\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/\",\"name\":\"Pentesting - BAYOOTEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bayootec.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/10\\\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg\",\"datePublished\":\"2023-10-01T13:35:18+00:00\",\"dateModified\":\"2025-01-24T14:53:17+00:00\",\"description\":\"Our principle in cybersecurity: We hack before anybody else does. We use pentesting to check software for IT security vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bayootec.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/10\\\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bayootec.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/10\\\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg\",\"width\":1200,\"height\":800,\"caption\":\"BAYOOTEC - Pentesting f\u00fcr eine h\u00f6here Cybersecurity - Wir testen deine Software auf Sicherheitsl\u00fccken\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/en\\\/it-services\\\/pentesting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.bayootec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pentesting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.bayootec.com\\\/\",\"name\":\"BAYOOTEC GmbH\",\"description\":\"Wir entwickeln Enterprise Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bayootec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/#organization\",\"name\":\"BAYOOTEC GmbH\",\"url\":\"https:\\\/\\\/www.bayootec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.bayootec.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/06\\\/BAYOOTEC-Softwareentwicklung-fuer-Enterprise-Software-1.svg\",\"contentUrl\":\"https:\\\/\\\/www.bayootec.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/06\\\/BAYOOTEC-Softwareentwicklung-fuer-Enterprise-Software-1.svg\",\"width\":1180,\"height\":165,\"caption\":\"BAYOOTEC GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/bayootec-bu\\\/\"],\"description\":\"IT-Dienstleister f\u00fcr individuelle Enterprise Softwareentwicklung. Spezialisiert auf digitale Plattformen, Cloud-Native-Entwicklung, UX\\\/UI Design und digitale Transformation f\u00fcr gro\u00dfe und mittelst\u00e4ndische Unternehmen im DACH-Raum\",\"email\":\"info@bayootec.com\",\"telephone\":\"+49615186180\",\"legalName\":\"BAYOOTEC GmbH\",\"foundingDate\":\"2021-12-01\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.bayootec.com\\\/#\\\/schema\\\/person\\\/dcf6c9fe61c3c7cb86a53fcc843aebe0\",\"name\":\"Anna Lischka\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/75a6943ebdc54e531c71c284853db775a2922dba371a9fb83d6a72a2322d6958?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/75a6943ebdc54e531c71c284853db775a2922dba371a9fb83d6a72a2322d6958?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/75a6943ebdc54e531c71c284853db775a2922dba371a9fb83d6a72a2322d6958?s=96&d=mm&r=g\",\"caption\":\"Anna Lischka\"},\"url\":\"https:\\\/\\\/www.bayootec.com\\\/en\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pentesting - BAYOOTEC","description":"Our principle in cybersecurity: We hack before anybody else does. We use pentesting to check software for IT security vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/","og_locale":"en_US","og_type":"article","og_title":"Pentesting","og_description":"Our principle in cybersecurity: We hack before anybody else does. We use pentesting to check software for IT security vulnerabilities.","og_url":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/","og_site_name":"BAYOOTEC","article_published_time":"2023-10-01T13:35:18+00:00","article_modified_time":"2025-01-24T14:53:17+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg","type":"image\/jpeg"}],"author":"Anna Lischka","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anna Lischka","Est. reading time":"29 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/#article","isPartOf":{"@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/"},"author":{"name":"Anna Lischka","@id":"https:\/\/www.bayootec.com\/#\/schema\/person\/dcf6c9fe61c3c7cb86a53fcc843aebe0"},"headline":"Pentesting","datePublished":"2023-10-01T13:35:18+00:00","dateModified":"2025-01-24T14:53:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/"},"wordCount":6775,"commentCount":0,"publisher":{"@id":"https:\/\/www.bayootec.com\/#organization"},"image":{"@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg","keywords":["Compliance","Cybersecurity","GDPR","GDPR","IT-Security","IT-Security","Pentest","Pentesting","Security"],"articleSection":["Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/","url":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/","name":"Pentesting - BAYOOTEC","isPartOf":{"@id":"https:\/\/www.bayootec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/#primaryimage"},"image":{"@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg","datePublished":"2023-10-01T13:35:18+00:00","dateModified":"2025-01-24T14:53:17+00:00","description":"Our principle in cybersecurity: We hack before anybody else does. We use pentesting to check software for IT security vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/#primaryimage","url":"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg","contentUrl":"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/10\/BAYOOTEC-Pentesting-fuer-eine-hoehere-Cybersecurity-Wir-testen-deine-Software-auf-Sicherheitsluecken.jpg","width":1200,"height":800,"caption":"BAYOOTEC - Pentesting f\u00fcr eine h\u00f6here Cybersecurity - Wir testen deine Software auf Sicherheitsl\u00fccken"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bayootec.com\/en\/it-services\/pentesting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.bayootec.com\/"},{"@type":"ListItem","position":2,"name":"Pentesting"}]},{"@type":"WebSite","@id":"https:\/\/www.bayootec.com\/#website","url":"https:\/\/www.bayootec.com\/","name":"BAYOOTEC GmbH","description":"Wir entwickeln Enterprise Software","publisher":{"@id":"https:\/\/www.bayootec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bayootec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bayootec.com\/#organization","name":"BAYOOTEC GmbH","url":"https:\/\/www.bayootec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bayootec.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/06\/BAYOOTEC-Softwareentwicklung-fuer-Enterprise-Software-1.svg","contentUrl":"https:\/\/www.bayootec.com\/wp-content\/uploads\/sites\/2\/2023\/06\/BAYOOTEC-Softwareentwicklung-fuer-Enterprise-Software-1.svg","width":1180,"height":165,"caption":"BAYOOTEC GmbH"},"image":{"@id":"https:\/\/www.bayootec.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/bayootec-bu\/"],"description":"IT-Dienstleister f\u00fcr individuelle Enterprise Softwareentwicklung. Spezialisiert auf digitale Plattformen, Cloud-Native-Entwicklung, UX\/UI Design und digitale Transformation f\u00fcr gro\u00dfe und mittelst\u00e4ndische Unternehmen im DACH-Raum","email":"info@bayootec.com","telephone":"+49615186180","legalName":"BAYOOTEC GmbH","foundingDate":"2021-12-01","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/www.bayootec.com\/#\/schema\/person\/dcf6c9fe61c3c7cb86a53fcc843aebe0","name":"Anna Lischka","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/75a6943ebdc54e531c71c284853db775a2922dba371a9fb83d6a72a2322d6958?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/75a6943ebdc54e531c71c284853db775a2922dba371a9fb83d6a72a2322d6958?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/75a6943ebdc54e531c71c284853db775a2922dba371a9fb83d6a72a2322d6958?s=96&d=mm&r=g","caption":"Anna Lischka"},"url":"https:\/\/www.bayootec.com\/en"}]}},"_links":{"self":[{"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/posts\/4118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/comments?post=4118"}],"version-history":[{"count":33,"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/posts\/4118\/revisions"}],"predecessor-version":[{"id":11297,"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/posts\/4118\/revisions\/11297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/media\/4092"}],"wp:attachment":[{"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/media?parent=4118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/categories?post=4118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bayootec.com\/en\/wp-json\/wp\/v2\/tags?post=4118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}