International Industrial Company
Design and source code review of an authentication service
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Design and source code review of an authentication service
DNS-discovery and penetration test of externally accessible portals without authentication
Evaluation of the current Cybersecurity Governance and organization, comparison to competitors and creation of a new Cybersecurity Governance strategy
Training of the IT security manual for all IT employees with focus on operations and developers/devOps enriched with live hacking demos and practical examples
Penetration Test of a web application that supports the onboarding process of new customers. The application executes compliance checks
Technical security audit of an application used by clients in order to create leasing application forms
Red Teaming: Comprehensive attack simulation from the point of view of a compromised employee as well as an attacker with access to the internal network
Penetration Test of a solution for license administration and a solution for IT inventory management
Security audit of a web application and mobile applications to book passenger transportation services
Windows and MacOS client audit as well as verification of mailserver, proxy filter functionality and network segmentation
Audit of an application used by clients in order to create leasing application forms
Penetration test of a flexibly configurable web application for the efficient onboarding of new customers
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: