Energy Company
Firewall security audit
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Web application penetration test of an auction platform
Web application penetration test and mobile application penetration test of a solution to detect counterfeited products
Reverse engineering and penetration test of an application for foreign payment transactions
Test of an iOS and Android shopping application including the back-end infrastructure
Application penetration test and configuration review of an Unified Access Gateway
Web application penetration test (incl. re-test) of an application for the online processing of sale and loan
Consulting about performing phishing-awareness campaigns
“Secure web development”-training of all developers with focus on AngularJS and Java
Penetration test of a client software for Windows. Besides the client itself, the sending of data from the client to a server was tested
Citrix audit of a remote access with a special focus on user authentication and possible data exfiltration
Audit of managed iOS devices by means of a configuration reveiw of the Intune policies and a technical test of a reference device
Web application penetration test of an old application used for designing marketing materials, labels, products packaging, etc. Focus on unauthenticated access
Red Teaming: Comprehensive attack simulation from the point of view of a compromised employee as well as an attacker with access to the internal network
Penetration test of a web application and its interface with the customers CRM
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: