E-Bike Manufacturer
Design review of the network architecture and the Azure tenant, and Security Scan
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Design review of the network architecture and the Azure tenant, and Security Scan
Audit of a client using the Windows 10 Enterprise operating system with a special focus on possible data exfiltration and on the login function
Web application penetration test of a feedback and voucher portal for customers who ordered products
Penetration test of a client-server application. The project modules included debugging and reverse engineering of the client application as well as a penetration test of the server interfaces used.
Audit of the implementation of a prescribed information security protection catalogue in an application in public operation
Web application penetration test and partial code review of an application to submit reports
Penetration test of a web application for cost analysis
Penetration test of a login portal with single sign-on and security audit of a cloud provider with a focus on the isolation of the existing tenants
Awareness training for all employees with 4 sessions on mobile devices and BadUSB incl. a live hacking demo
Web and mobile application penetration tests of an application for the coordination and management of water, energy and utility systems
Red Teaming: comprehensive attack simulation from the perspective of a compromised employee and an attacker with access to the internal network
Red Teaming: comprehensive attack simulation from the perspective of an external attacker with the goal to gain access using social engineering attacks and further infiltrate the internal network
Testing the physical and network attack vector of an IoT environment to collect and analyze data
Configuration review of iOS devices managed with Intune with a special focus on protected data not being recoverable when a device is wiped
Web application penetration test of a web application for sharing and providing sensitive documents
Security scan of approx. 20 systems that can be accessed from the Internet, followed by an in-depth penetration test of 6 selected systems
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: