Tapkey is Pentest Approved

Pentest

Tapkey Security approved by SySS

Security is a top priority for us at Tapkey, which is why we always strive to ensure that our systems are as secure as possible for the sake of our customers. Unfortunately, hackers aren’t always impressed by this and try to find those vulnerabilities that we may have overlooked. In order to address this, we have without further ado commissioned hackers to hack into our systems, enabling us to take other perspectives into account. To be more specific, we’ve commissioned SySS GmbH, the market leader for penetration tests in Germany and Europe, to perform a penetration test on our systems.

What is a penetration test?

It’s a security analysis in which “white hat hackers” try to break into the system to uncover security holes and vulnerabilities before someone else finds them and uses them to their own advantage.

Particular attention was paid to our web services during the tests, with SySS working independently without any specifications on our part. With access to the developer page and an account in our sandbox environment, the experts began their tests and attacks on our systems.

“Overall security level has been rated as good.” – Quote from the SySS final report.

Our constant commitment to maintain the highest security levels for our systems is in our company’s DNA and at the heart of everything we do. We’re therefore particularly delighted that this has also been recognised by external experts. Tapkey is officially SySS security approved!

SySS Certified Product Approved Security
Tapkey und OSS
Security

Tapkeys Security

Read more
Passende Zutrittsprodukte für die Tapkey App
Transponder

NFC Tags & more

Shop here
Access Control Industry in Numbers

Growth, trends, COVID-19 impact and forecasts about the [...]

Mehr lesen
The Last Mile—Smartly Planned

The logistical effort of package delivery is increasing [...]

Mehr lesen
Vehicle Access: OEM or Retrofit Solution?

OEMs are developing proprietary technologies, other players are [...]

Mehr lesen
Mobile Access Control: The Icing on The Cake

In this article, we explain to what extent [...]

Mehr lesen