Tool Manufacturer
Security design and architecture review of a network and penetration test of some external gateways
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Security design and architecture review of a network and penetration test of some external gateways
Reverse Engineering & Application Penetration Tests of several services for the collection and evaluation of safety-relevant fault reports
Web application penetration test of a customer portal and application penetration test of a CRM API
Comprehensive awareness audit of the IT employees through electronic and physical social engineering
Comprehensive audit of an online shopping solution including surrounding systems as well as a Windows client audit and an audit of the mailing systems
Audit of the protection mechanisms of two mobile applications including partial code review
Web application penetration test of a real estate analysis and evaluation platform
Web application penetration test of a real estate analysis and evaluation platform
Security audit of the new IT network by means of firewall audits, a security scan from the client network, and a Citrix audit from the perspective of a normal user
Security scan of DMZ systems and subsequent penetration test of selected systems
Technical verification of a Skype for Business infrastructure by the means of a configuration review as well as an internal and external security scan
Re-test of a SOAP interface, a web client as well as the associated iPad application
Security Scan, WLAN audit and consulting regarding potential measures for a small company offering PMO services
Support in the assessment of security risks, especially with regards to external third party risks
Web application penetration test of a web portal for managing employee data with special focus on the separation of data between individual clients
Security audit of two applications for data processing in the Azure cloud. Penetration test and code review of the applications, as well as a design review of the Azure infrastructure
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: