Retail Group
Security assessment and configuration review of a new hosting environment
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Review of and adjustments to an acceptable use policy based on ISO 27002
Application penetration test of a mobile data acquisition device and cash registers
ISO 27002 security audit; analysis of the security level by means of questionnaires, interviews and reviews of information security policies as well as bespoke and risk-based suggestions for improvements on information security
ISO 27002 security self-assessment; analysis of the security level by means of a questionnaire, interview for verification purposes as well as bespoke suggestions for improvements on information security
Web application penetration test and partial code review of a new login process for a web portal
Web application penetration test of the newly developed company website
Web application penetration test of a PKI (Public Key Infrastructure)
ICS security audit of the cantonal traffic management system incl. internal security scan, internal and external penetration test, design review, firewall ruleset audit and red teaming
Security scan of the publicly available IT infrastructure and of the internal LAN networks
Web application penetration test of a platform for installation calculations
Web and mobile application penetration test of a news portal and security scan of the infrastructure
Penetration test API as well as web and mobile application penetration test of an asset management system
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: