References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Insurance Company

IT security audit of the internet-facing infrastructure of an insurance company

IT Service Provider

Awareness trainings for IT managers and simulation of a phishing campaign over 30 companies

IT Services Provider

Review ISDS concept and architecture & security design review including on-site workshop with the responsible persons

City Administration

Penetration test and code review of a software for the implementation of projects

Retail Group

Web application penetration test for an alternative payment method in a webshop

Insurance Group

Security scans of the Skype for Business infrastructure from the perspective of an external and internal attacker. Design review of the concept and selective check of the configuration whether the concept was implemented as intended

Media Group

Security audit of an audio live streaming infrastructure by means of an application penetration test, security scan, configuration and design review

Marketing Group

Security design and configuration review of a Google cloud and Terraform based infrastructure with multiple environments and applications

Energy Company

Audit of a telephony infrastructure from an internal and external perspective

Logistics Group

Audit of an email encryption service for sending sensitive content

Bank

Web application penetration test of a file transfer solution from an internal and external perspective

Tool Manufacturer

Penetration test of a web application that is used to plan construction projects

Real Estate Group

Comprehensive review of an IT infrastructure implemented from scratch. The systems accessible from the Internet and the clients used internally by employees were examined. In addition, an audit of the firewall and proxy configurations was carried out

Trustee Service Provider

Conducting of a general IT controls (GITC) audit on the basis of a predefined control catalogue. Detailed audit of the SAP system and underlying database and operating system via a third party ISAE 3402 report

Supervisory Authority

Security audit of a self-registration platform in the form of a web application penetration test

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts