Tool Manufacturer
Penetration test of an API for collecting measurement data
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Mobile application penetration test of a mobile application for communication between customers and a public organization
Audit of an internal web application including code review for Log4j vulnerabilities
Penetration test of an API which can be used to create and retrieve orders
Penetration test of an application for managing various measurement data from construction sites
Analysing the security level of the integration between a point of sales terminal and its corresponding server by means of a penetration test
Security audit of the client-side web applications and the functionality for a digital insurance card in the mobile app
Security audit of the physical infrastructure and network design of a new building using a design and configuration review of network separation and access protection, penetration testing, physical walk-through of the building, and physical social engineering
Security audit of an e-banking solution by means of penetration tests and an architecture and design review
Technical security audit of a Linux server environment by means of vulnerability scans and an audit of a reference system, as well as a review of user and rights management
Partial code review and penetration testing of a customer pricing management application with respect to internal manufacturing costs and other factors
Web application penetration test of a financial application, for evaluating global public financial data
Penetration test of on-premise instances of Cloudera Data Platform and Cloudera Data Science Workbench
Penetration test of an interface for the automation of processes such as the transfer of tax amounts and invoicing
Security audit of the Windows and Citrix client environment and Microsoft Teams by means of several configuration reviews, penetration tests and a client audit as well as security reviews from a technical and conceptual point of view for 2-factor authentication services
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: