Tool Manufacturer
Web application penetration test of an internal tool management application and configuration review of the associated cloud environment
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Web application penetration test of an internal tool management application and configuration review of the associated cloud environment
Consulting regarding certificate management and programming processes for medical devices
Security audit of a web application for the inventory of tools and its associated mobile application and interfaces
Penetration test from the perspective of an external and internal attacker of a communication platform that enables reliable and secure message delivery between two endpoints. Review of the security-relevant configuration of application components and the systems on which the components run. Moreover, unprivileged penetration test of other systems connected to the communication platform.
Simulation and analysis of a phishing campaign over a part of the workforce from several locations. Additionally, it was examined how well the mail filter blocks malicious attachments
Comprehensive audit of the command and control network environment for energy and water supply via architecture review, configuration review and technical tests in the control networks
Web application penetration test of a communication system for debt settlement
Security configuration review, partial code review and web application penetration test of an authentication solution based on Keycloak
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: