Tool Manufacturer
Cloud computing workshop with executive managment
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Write-up of a high-level concept to harden IT systems and development of hardening guides for Windows Server 2016, Red Hat Linux, Citrix, JBoss and Docker/Kubernetes
ISO 27002 security audit; analysis of the security level by means of a questionnaire, interviews for verification purposes as well as bespoke suggestions for improvements on information security incl. prioritized measures
Mobile application penetration test of the iOS and Android application incl. back-end functionality
Host discovery, security scan and penetration test of the publicly accessible IT infrastructure
Security scan of externally as well as internally accessible systems and IT security workshop
Awareness presentation at an affiliated doctors conference with live demos on cybersecurity, data security, email, cloud services and mobile devices
Penetration test of a survey application for potential employees as part of the recruitment process
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: