References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

International Industrial Company

Risk analysis and technical assessment of a proposed technical security measure to protect a business critical Oracle database against current threats

Pharmaceutical Group

Supporting the development of an internal guideline to select and execute security tests

Electric Supply Company

Comprehensive audit of a network control environment, incl. technical tests of servers and devices in a substation, analysis of network traffic and review of the firewall rules

Logistics Group

Windows 10 Client Audit and Harding-Review of a kiosk environment for a logistics application

Bank

Security audit of specific API endpoints

Bank

Comprehensive penetration test of a PSD2 interface

Energy Company

Re-test of a web application for querying information

Retail Group

Web application penetration test of a site with several raffles

Retail Group

Web application penetration test of a promotion

Marketing Group

ISO 27002 security audit; analysis of the security level by means of a questionnaire tailored to customer needs, verification by means of an interview and document review; bespoke suggestions for improvements on information security incl. risk-based and prioritized measures

IT Services Provider

Security Scan, Penetration Test und Web Application Penetration Test of different external web applications

Energy Company

Web application penetration test of an SAP Fiori application

Tool Manufacturer

Review of the architecture and configuration of a VPN solution and penetration test of the backends

Retail Group

Web Application Penetration Test of a retail promotion website: a static website with recipes, ideas, etc. concerning a public holiday

Tool Manufacturer

Intensive audit of an asset management portal: The scope of the audit included the web application, the associated Android application and the connected backends. The tests were performed both authenticated and unauthenticated

Supplier of glass solutions and processing of polymer products

Comprehensive IT security audit including electrical and physical social engineering. The network infrastructure was examined by means of an external and internal security scan, a physical inspection of a site was carried out and a phishing awareness campaign was conducted across the entire workforce

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts