Tool Manufacturer
Security configuration review of a file synchronisation application in AWS
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Security configuration review of a file synchronisation application in AWS
Web application penetration test of a site for the management of gastronomy businesses
Web application penetration test for a part of a web application where bank customers can generate recommendations for a fund
Creation of around 24 incident response runbooks for various use cases for the Security Operation Center (SOC) of a cantonal IT department
Comprehensive security audit of an IoT platform
Architecture and design review of the entire network infrastructure
Workshop to identify general security problems in IT and, if necessary, make recommendations for the solution of the security gaps. The goal was to get a second opinion on the current security measures.
Security check of the functionalities that have been introduced with a new release of an online banking solution as well as verification of the resolved findings since the last test
Security audit of a mobile application management solution based on Microsoft Intune
Review and consulting for the development of a cryptographic solution for data anonymization
Security audit of a web application for inventorying tools and the associated mobile application and configuration review of the associated cloud environment
External security scan of multiple systems. Penetration test of multiple web, mobile, and windows applications together with the client at their office. The focus was on know-how transfer.
Audit of a function for migration between two major releases of a mobile app for Android and iOS
Workshop about the configuration and usage of a vulnerability scanner
Web application penetration tests of a customer portal and the user administration by the back office as well as verification if the applications and infrastructure comply with internal security regulations
Architecture and design review, incl. audit of the firewall rules, of the production networks for a chemical plant
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: