References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

E-Bike Manufacturer

Design review of the network architecture and the Azure tenant, and Security Scan

Private Bank

Audit of a client using the Windows 10 Enterprise operating system with a special focus on possible data exfiltration and on the login function

Retail Group

Web application penetration test of a feedback and voucher portal for customers who ordered products

Government Agency

Penetration test of a client-server application. The project modules included debugging and reverse engineering of the client application as well as a penetration test of the server interfaces used.

Cantonal Administration

Audit of the implementation of a prescribed information security protection catalogue in an application in public operation

Supervisory Authority

Web application penetration test and partial code review of an application to submit reports

Insurance Group

Seminar for CEOs of SMEs on cyber security threats and measures

IT Company

Penetration test of a login portal with single sign-on and security audit of a cloud provider with a focus on the isolation of the existing tenants

Government Agency

Awareness training for all employees with 4 sessions on mobile devices and BadUSB incl. a live hacking demo

Software Developer

Web and mobile application penetration tests of an application for the coordination and management of water, energy and utility systems

Airport Operator

Red Teaming: comprehensive attack simulation from the perspective of a compromised employee and an attacker with access to the internal network

Cantonal Bank

Red Teaming: comprehensive attack simulation from the perspective of an external attacker with the goal to gain access using social engineering attacks and further infiltrate the internal network

Mobility Provider

Testing the physical and network attack vector of an IoT environment to collect and analyze data

Private Bank

Configuration review of iOS devices managed with Intune with a special focus on protected data not being recoverable when a device is wiped

Drive System Manufacturer

Security scan of approx. 20 systems that can be accessed from the Internet, followed by an in-depth penetration test of 6 selected systems

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts