Insurance
Security awareness training for all employees (incl. hacking demonstration and practical examples) with a focus on phishing
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Security awareness training for all employees (incl. hacking demonstration and practical examples) with a focus on phishing
Penetration test of a web shop after transfer into a new zone and infrastructural adjustments
Technical and conceptual audit of an Enterprise Mobility Management (EMM) solution
Penetration test incl. source code review of a mobile application for the management of investment focuses of the asset portfolio
External penetration test of three different web applications for the administration of the certificate infrastructure including test of the registry and LDAP and OCSP servers
Penetration test of a website incl. online shop
Security audit of the e-mail infrastructure using Advanced Mail Tests. In particular, it was checked whether (test) viruses are detected, which file types are accepted as attachments by the mail server and whether the e-mail infrastructure can be misused for spam attacks
Web application penetration test and partial code review of a chatbot
Red Teaming: comprehensive attack simulation to evaluate the implemented protection measures as well as the reactivity of the SOC and physical social engineering at two locations
Web application and API penetration test of a synchronisation middleware
Privileged and unprivileged penetration test of global remote accesses
External penetration test of externally accessible servers and technical assessment of the internal IT infrastructure to determine the general level of protection of the systems currently in use
Investigation of a login and registration process supported by initial codes
Privileged and unprivileged test of a financial application from the outside and inside as well as a conceptual review with the control of security-relevant code
Workshop for developers on security risks in web applications with a brief introduction into the OWASP Top 10 and selected vulnerabilities to exploit themselves
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: