Tool Manufacturer
Web application penetration test of an API for requesting information
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Development of a “Security Operation Center” (SOC) operational model. For this purpose the requirements of all stakeholders were collected, evaluated and processed in several resulting documents: The developed role profiles were used to find suitable employees, the division into activities to be performed by the organization itself and activities to be performed by external parties served as a basis for the Managed Security Service Provider (MSSP) tender, and with the help of the identified risks and use cases the benefits of a SOC could be demonstrated to the management level.
Design review, configuration review and penetration test to evaluate if introducing Microsoft Teams would put company data at risk
Source code review and penetration test of the REST API for a notification service
Web application penetration test of an application for the administration of canteens
Security assessment of the entire IT environment through an architecture review, penetration test of the mail environment and internal client as well as a scan of all externally reachable systems
Penetration test of a mobile app for identification during an onboarding process
Audit of a revised website for managing assets. Additionally, the associated mobile applications for Android and iOS were tested.
Audit of the malware protection using specially developed software to simulate a ransomware and review of the backup concept
Web application penetration test of a platform for document management and a mobile application for capturing work steps on Android and iOS
Technical analysis and comparison of two endpoint protection solutions for attack detection and prevention
Execution of a host discovery scan as well as internal and external vulnerability scans to obtain a rough overview of the security of the company infrastructure
Security configuration review and penetration test of a Netscaler environment
Web application penetration test of an e-banking solution
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: