Most attacks are related to faulty human behavior – awareness measures directly help here

  • Price-performance ratio
  • References
  • Competence of the tester
  • Temporal and technical scope

A selection of our 100+ providers

Out value add:

We find the right provider for you in four steps – for free!



Specify requirements



Anonymous tender under Bosch brand



Transparent comparison of top 3 providers



Provider pitches and customer decision


1. We help you to specify your requirements

  • Requirement specification
  • E2E Tendering process
  • Provider validation

Start specification

2. CyberCompare tenders your requirements anonymously

  • Pre-selection based on our market insights
  • Leveraging the CyberCompare database
  • Identification of 5-6 relevant vendor
  • Tendering along the defined criteria

Understand our selection process

3. We provide you with an objective comparison of provider offerings

  • Consolidation of vendor information and preparation of a report with clear recommendations
  • Result presentation of the report
  • Pre-selection of 1-2 favours by customers

View example

4. You make the last decision with our support

  • Favourite providers present themselves in person to the customer
  • Customer makes his final decision
  • Accompaniment of interactions between customer and provider

Book an appointment

Perspective from one of our experts

Just another info campaign or additional rules will not solve the problem; rather, I am convinced that good safety is built on the psychological safety to eliminate dilemmas and a willingness to learn in the face of challenges and incidents.

Read the full interview

Clare Patterson

Former CIO Shell Energy


Make an appointment and compare provider for Penetration Test – especially for your case!

Contact our expert


Simeon Mussler

COO Bosch CyberCompare

+49 (0)711 811-19893

Human error is the key for most attackers. Trained personnel are aware of this and can counteract it

“Regular sensitization of employees through training, evaluation of effectiveness through phishing tests, and provision of practical aids (e.g., password manager)

People are the weakest link in the security chain. Most attackers enter the company primarily through phishing, but also through targeted manipulation and blackmailing.

It therefore makes sense to start right here with targeted awareness measures such as special training. A lot has happened in the area of training in recent years: he courses are easy to follow, fun, and the platforms are not particularly expensive, even compared to other security products, thanks to the wide range of offerings.”