Insurance Company
IT security audit of the internet-facing infrastructure of an insurance company
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
IT security audit of the internet-facing infrastructure of an insurance company
Awareness trainings for IT managers and simulation of a phishing campaign over 30 companies
Review ISDS concept and architecture & security design review including on-site workshop with the responsible persons
Penetration test and code review of a software for the implementation of projects
Web application penetration test for an alternative payment method in a webshop
Security scans of the Skype for Business infrastructure from the perspective of an external and internal attacker. Design review of the concept and selective check of the configuration whether the concept was implemented as intended
Security audit of an audio live streaming infrastructure by means of an application penetration test, security scan, configuration and design review
Security design and configuration review of a Google cloud and Terraform based infrastructure with multiple environments and applications
Audit of a telephony infrastructure from an internal and external perspective
Web application penetration test of a file transfer solution from an internal and external perspective
Web application penetration test of a SharePoint application for external contributors
Penetration test of a web application that is used to plan construction projects
Re-test of an interface for regulatory compliance of financial services
Comprehensive review of an IT infrastructure implemented from scratch. The systems accessible from the Internet and the clients used internally by employees were examined. In addition, an audit of the firewall and proxy configurations was carried out
Conducting of a general IT controls (GITC) audit on the basis of a predefined control catalogue. Detailed audit of the SAP system and underlying database and operating system via a third party ISAE 3402 report
Security audit of a self-registration platform in the form of a web application penetration test
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: