Tool Manufacturer
Penetration test of a REST API, which returns data records assigned to the respective user
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Penetration test of a REST API, which returns data records assigned to the respective user
Security scan of internal and external systems and audit of a client system. Analysis of process security and creation of a BCM workshop
External review of a catalog of fundamental measures for the long-term increase of information security
Mobile application penetration test and code review of an app to accept or decline bank transactions
Security assessment of a PSD2 integration of a web banking platform
Penetration test of a web application where users can check the conditions of a mortgage and apply for it
Creation of checklists for the transition from Citrix to the installation of various programs on clients as well as for the basic hardening of the Windows clients
Audit of a web application for managing patient data and medical information
Mobile penetration test of an iOS app for tracking consumed and burned calories
Review of a web portal for filling out different forms. In addition to the publicly accessible portal, the API requests used in the background, which are called internally by the various system components when processing the form data, were checked.
Internal security audit of a productive environment through a security scan. Some selected systems were examined in depth by penetration tests. Furthermore, a phishing awareness test was carried out on the entire staff.
Web application penetration test of a web portal for leasing partners of a car importer
Conducting a two-part tabletop exercise to test the incident response team and incident response processes
Evaluation of the new Group Policy Objects for the new Edge browser
Web application penetration test of an online shop spread over multiple domains
Audit of a DMZ using automated scanners. Depending on the scan results, individual systems were examined even more thoroughly by a manual penetration test with regard to possible external attack points.
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: