Financial Service Provider
Audit of a newly implemented interface and its associated security concept with regard to possible unauthorized access to data of other users as well as to vulnerabilities in general
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Audit of a newly implemented interface and its associated security concept with regard to possible unauthorized access to data of other users as well as to vulnerabilities in general
Unauthenticated testing of externally accessible systems using security scans and manual testing on selected systems
Web application penetration test and partial code review of a platform with sensitive data
Web application penetration test of a small web application to order and manage services
A technical test of a security operation center (SOC) to determine the detection capabilities and processes. To do this, various attacks were simulated and the detected activities analysed. Additionally a malware outbreak was simulated and the reaction of the SOC recorded
Security scan of internal network segments and external available network segments of a retail company. Additionally a shop site was also scanned for security vulnerabilities
Two-part security audit: testing a network of self-hosted systems using automated scans with isolated manual checks; moreover, on several externally operated systems, certain web applications were in scope of additional detailed penetration testing
Web application penetration test of a backend solution for banks
Windows 10 and Windows 7 client audit with focus on malware prevention
Conducting several combined technical and conceptual audits (incl. advanced mail test, Windows 10 client audit, ISO 27002 gap analysis, penetration test and configuration review as well as internal and external security scan) to assess the overall information security of the organisaiton
Security audit of a communication system for customers and their account managers
Workshop regarding the implementation of an ISMS (ISO27001/2) and information classification. Preparation of drafts for acceptable use policy and classification framework
Web application penetration test of an online portal for website redirects of a third-party provider
Penetration test of an API as well as mobile application which supports the patent recovery
Internal and external vulnerability scan of the company’s entire IT infrastructure
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: