References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Tool Manufacturer

Web application penetration test of an IoT software management platform

Insurance Group

Penetration test of a website to purchase insurance including payment system and account management

Retail Group

Web application penetration test and mobile application penetration test of a shopping application

Insurance Group

Web application penetration test of an insurance website with a user area displaying values of booked insurance policies

Internet Company

Web application penetration test of an insurance comparison portal

Retail Group

Web application penetration test of a webshop

Cantonal Bank

Web application penetration test of the login of an e-banking solution

Retail Group

Mobile application penetration test of a fitness app

Consulting Firm

Security audit of external systems with the help of a security scan. Based on this, an in-depth review of selected systems was carried out by means of a penetration test and a web application penetration test.

Tool Manufacturer

Penetration test of a web application for the managment of licenses and some backend APIs

Tool Manufacturer

Web application penetration test of a tool to support product selection

IT Service Provider

Security configuration review of firewall and VPN, security scan over a defined number of IP addresses and multiple penetration tests of different applications and their associated systems

Administration

Penetration test of a Covid-19 related web application

Government Agency

Penetration test of a web application for employers to manage payments

IT Services Provider

Penetration test of a web application, which processess many different types of inputs via multipe APIs and uploads, and an SFTP server with a focus on privilege escalation and FTP breakouts

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts