References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Trust Service Provider

Web application penetration testing of multiple certificate and certificate authority management sites

Software Developer

Authenticated penetration test of a web application and an API used to manage stock levels

Tool Manufacturer

Penetration test of a central management system for optimization and planning of material usage

Testing Institute

Process and Architecture Review, Code Review and Penetration Test of a mobile application incl. the backend infrastructure for managing patient data

Biotechnology Company

Technical security audit of the IT infrastructure, including a security scan of the internal and external infrastructure as well as an audit of a Windows 10 client. Additionally, a review of the mail infrastructure and a phishing campaign were performed.

Insurance Group

Conceptual and technical review of an ADFS server against the internet

Cantonal Bank

Audit of an enduser client including the VPN solution and analysis of the Active Directory environment

Research Institute

Web application penetration test of a portal for registration for Covid tests and managing the probes

Private Bank

Penetration test of an iOS and Android application

Consulting Firm

Security audit including an advanced mail test, external penetration test and internal security scan to determine the security level of the IT infrastructure

Private Bank

Web application penetration test of an e-banking application

Consulting Firm

Penetration test of a SharePoint instance with a special focus on the management / correct enforcement of access rights

Cantonal Administration

Penetration test of a desktop server application for secure file transfer between different administration offices

Fintech Company

Web application penetration test and code review of a website for managing tokens on the Ethereum blockchain

Hospital Group

Security audit of a patient terminal with a focus on potential data leakage and unprivileged access to patient data by means of a mobile device audit with a timeboxed approach

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts