References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Software Developer

Mobile application penetration test (iOS, Android) and code review of an app for the banking sector

Energy Company

Windows 10 client audit and security configuration review of the remote access

Private Bank

Web application penetration test of a banking protocol and security configuration review of a web application firewall

Mechanical Engineering Group

Assessing the security level by means of technical security audits from the internal and external perspective in the form of several security scans of internal networks and web application penetration tests of selected web applications

Tool Manufacturer

Web application penetration test of a newly implemented voucher functionality in an existing store environment

Software Developer

Application penetration test and code review of a Windows application for managing finances of companies

Service Provider

Technical and conceptual audit with internal security scan, Windows client audit as well as a process and design review

Service and Production Company

Red Teaming Assessment with OSINT collection, phishing emails, analysis of the internal attack surface and search for critical vulnerabilities as well as lateral movement in the internal network

Software Developer

Web application penetration test and code review of a web API for pairing clients and data transfer between clients

City Administration

Security audit of the filter functions of a web proxy by means of technical tests and a review of the configuration as well as penetration tests of the interfaces from an internal and external perspective

Government Agency

Conducting a multi-stage audit with physical social engineering and a technical review of the Citrix platform using penetration tests with a focus on privilege escalation

Private Bank

Technical security audit with external security scan, web application penetration test, and test of the email infrastructure as well as a review of the firewall rules and conducting awareness training

Cantonal Administration

Conducting a SOC study that identified and defined the operating model and services of a SOC, compared potential SOC service providers, and identified the financial resources required

Software Developer

Web application penetration test of a backoffice application for dealing with open payments and security configuration review of the relevant parts in the AWS Management Console

Bank

Security Review of the Active Directory

Tool Manufacturer

Configuration/Code Review and Penetration Test of an MQTT-based cloud backend for IoT devices

Retail Group

Web application penetration test of a 2-factor login

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts