References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Tool Manufacturer

Security configuration review of a file synchronisation application in AWS

Bank

Web application penetration test for a part of a web application where bank customers can generate recommendations for a fund

Cantonal IT Department

Creation of around 24 incident response runbooks for various use cases for the Security Operation Center (SOC) of a cantonal IT department

Tool Manufacturer

Penetration test of a plugin and web application for model creation

Industrial Company

Workshop to identify general security problems in IT and, if necessary, make recommendations for the solution of the security gaps. The goal was to get a second opinion on the current security measures.

Private Bank

Security check of the functionalities that have been introduced with a new release of an online banking solution as well as verification of the resolved findings since the last test

Real Estate Group

Security audit of a mobile application management solution based on Microsoft Intune

Fintech Company

Review and consulting for the development of a cryptographic solution for data anonymization

Tool Manufacturer

Security audit of a web application for inventorying tools and the associated mobile application and configuration review of the associated cloud environment

Bank

Penetration test of a web application used to create requests for personal loans

Industrial and Technology Company

External security scan of multiple systems. Penetration test of multiple web, mobile, and windows applications together with the client at their office. The focus was on know-how transfer.

Tool Manufacturer

Audit of a function for migration between two major releases of a mobile app for Android and iOS

Tool Manufacturer

Security review of the ruleset of a perimeter and a VPN firewall

Service Company in the Energy Sector

Web application penetration tests of a customer portal and the user administration by the back office as well as verification if the applications and infrastructure comply with internal security regulations

Biotechnology Company

Architecture and design review, incl. audit of the firewall rules, of the production networks for a chemical plant

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts