Software Developer
Audit of an API including associated JWT authentication
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Security support during set up of an IoT environment. Review of cloud-based architecture and technical penetration tests of the services and apps
Technical and conceptual assessment of a certificate-based VPN infrastructure
Architecture and design review, incl. audit of the firewall rules, of the production networks for a chemical plant
Testing of a SAP infrastructure against a security baseline by means of a configuration review and a penetration test
Audit of several web pages created in TYPO3, with special focus on form fields used and file uploads
Web and mobile application penetration tests for the new version of an online shop
Penetration test of a standardized interface for processing payment transactions
Creation of a network concept for an international company including production sites
Performing a simulated security incident to train the incident response team
Design and architecture review incl. configuration review and reachability/penetration test of a store guest-network infrastructure
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: