Technology Corporation
Web application penetration test of a toll system
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Composition of a superordinate hardening concept for IT systems and network devices. Composition of hardening guides for operating systems (Windows, Linux/Unix), applications (JBoos) and virtualization platforms (Docker/Kubernetes, Citrix XenApp/XenDesktop)
Host discovery, security scan and penetration test of the public reachable IT infrastructure
Workshop for the IT managers with main focus on cloud outsourcing, vulnerable areas in the IT system landscape and physical attacks on mobile devices
Penetration test of an application for remote desktop connections on Windows based working devices
Security audit of the control network and the controller network by SCADA/ICS penetration tests, application penetration tests, firewall ruleset reviews, network tracing, wireless audit and architecture and configuration reviews
ISO 27002 security audit; analysis of the security level by means of a questionnaire tailored to customer needs, interview for verification purposes as well as bespoke suggestions for improvements on information security incl. risk-based and prioritized measures
Red Teaming of all internally accessible systems as well as phishing and social engineering, USB road apple and Windows client penetration test
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: