Meet Martin Voelk
Thanks for visiting my website! I am a seasoned IT Security expert and Penetration Tester, who helps companies and individuals to uncover flaws and security vulnerabilities in their IT systems in order to fix them.
IT, Networking and Security Technologies have already fascinated me from a very young age. I started working in IT in 1997 and have been working as a freelancing Security Consultant for clients around the globe. My clients range from SMB to Fortune 500 companies as well as governments and the military.
Initially I started out a Windows Server Admin and then moved into Networking and Cisco technologies and I have done my Cisco CCIE certification in 2004. Later I worked as a Network Security Consultant for ISPs, banks, government agencies as well as Certified Instructor delivering Networking, Security and Wireless technology training around the globe. My career took me around the world. From Germany (where I am originally from) to the UK, all over Europe, South Africa, the Middle East, Russia, Japan, Australia, Singapore, Canada, Mexico and the United States.
In 2009, 2 partners and myself founded our Penetration Testing consulting company Cyber 51 LLC, which was acquired by GigIT Inc. in October 2018. These days I still keep hands-on and spend around 50% of my time on active IT Security consulting such as Pen Testing and my other 50% on aspects of the business. Read more…
WHAT DO I OFFER? PENETRATION TESTING!
A Penetration Test is a method of evaluating computer and network security by simulating an attack on a computer system or network from external and internal threats. The same tools, know-how and methodologies are being used, as malicious hackers would employ, but in a Penetration Test the company being tested has granted explicit written permission to perform such testing prior to the engagement.
WHY ME?
Expert in Penetration Testing
Holding some of the highest security certifications
Experience across all sectors and business sizes
Pride in excellence of my work
Your Security is my Priority!
THE VALUE
Discovery & Mitigation of vulnerabilities
Reducing risk to your business
Protecting your IT security investment
Protecting clients, partners and third parties
One-time off or recurring options
WHY SHOULD YOU GET REGULAR PENETRATION TESTS?
What would happen if a competitor or hacker would steal your digital assets?
What legal consequences and lawsuits would a security breach have for you?
What financial implications would you face if your IT systems are taken down?
What reputational damage would a successful hack pose to your business?
Did you know that 90% of all deployed IT systems have vulnerabilities?
DELIVERABLES
Every Penetration Testing / Vulnerability Testing Service contains the following deliverables:
Comprehensive report (Executive summary and in-depth technical report) only at agreed testing times (for example at nights, weekends etc.
Mitigation Advice on encountered vulnerabilities
Never running malicious exploits or DDoS Tests unless agreed beforehand
1 Debrief call with the client over WebEx to go through the report
Instant notification of critical vulnerabilities found during testing phase
Secure report delivery by encrypted email
1 Re-test after the initially encountered vulnerabilities have been mitigated (at a heavily discounted rate)
SERVICES
Network Penetration Testing Vulnerability Assessment
Network Penetration Testing is a security testing service that focuses on locating flaws in your networks…
Web App Penetration Testing Vulnerability Assessment
More than 70% of all technical attacks aim at the Web Application layer. This service examines your web applications…
Wireless Penetration Testing
Wifi Networks experience ever increasing popularity. Our Wireless Penetration Testing covers all threat vectors against Wifi…
Mobile Application Penetration Testing
Mobile devices have surpassed desktops a while back. Mobile Application Penetration Testing covers all threat vectors…
Social Engineering
Often the latest technical perimeter defenses may be in place, yet corporate security isbeing breached. Why?
Cyber Intelligence Services
Have you heard about the dark web? This is where a lot of illegal hacking activities take place. Has your confidential data leaked out already?
Online Investigation Services
More and more criminal activity is taking place online. Our services are aimed at businesses and individuals alike…