References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Tool Manufacturer

Penetration test of a multi-tenant platform for managing IoT devices

Supplier for the Gastronomy Industry

Web application penetration test of a store system with instances for different countries. Special focus was on the separation of customer accounts from each other and between the individual countries.

Tool Manufacturer

Web application penetration test of a website used to calculate loads in a design as well as a website to calculate the required products for the chosen design

Insurance Group

Web and mobile application penetration test of an application for configuring and managing events

Private Clinic

Technical security audit of the IT infrastructure, including a vulnerability scan of the internal and external infrastructure as well as an audit of a Windows 10 client. Additionally, a review of the firewall configuration and mail infrastructure was performed.

Retail Group

Web application penetration test of a single-page application for registering scratch codes and winning disount codes

Retail Group

Web application penetration test of a promotion page and review of the API interfaces used

Administration

Development of a Security & IT Service Continuity Management Plan, which serves as a basis for providing legally required evidence in the areas of Business Continuity Management (BCM) and IT Service Continuity Management (ITSCM)

Retail Group

A black-box web application penetration test of an API

Private Bank

Web application penetration test of a PSD2 API

Government Agency

Web and mobile application penetration test of an application for viewing meeting-related information

Retail Group

Penetration test of a 3D product configurator

IT Company

Web application penetration test of a portal to manage a cloud infrastructure and conceptional and technical verification of the tenant isolation

Tool Manufacturer

Architecture and design review of a cloud-based single sign-on solution

Administration

Development of hardening guides for Linux and Windows Server

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts