References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Logistics Group

Web application penetration test of an electronic voting system

University

Presentation on the ISO 27000 framework, BSI IT baseline protection (IT-Grundschutz), risk management and the BSI layer model for IT employees

Logistics Group

Web application penetration test of two new online services

Retail Group

Penetration test and configuration review of a WLAN infrastructure including their clients

Tool Manufacturer

Web application penetration test of an application to calculate the statics and to generate material lists

Retail Group

Web application penetration test of a promotion campaign with a competition

Tool Manufacturer

Penetration test of an application and various related systems for automated software distribution

Administration

Web application penetration test of a user administration application, as well as an application penetration test of several web services

Tool Manufacturer

Web application penetration test of application interfaces (API) for customer data and software license administration

Insurance Company

Security Audit of a data bank platform incl. server via application penetration test, infrastructure penetration test and configuration review

Media Group

Review of an extensive IT security policy and workshop on the cybersecurity organization

Tool Manufacturer

Audit of application interfaces (API) to customer data and software license management

Bank

Web application penetration test of an e-banking application in various Asian countries

Insurance Company

Red teaming of externally reachable systems and interfaces of a test, integration and productive environment

Bank

Review of the connection to the internal virtual desktop infrastructure over the Citrix Receiver. The behavior of the Citrix Receiver application was checked for Windows, Mac OS, iOS and Android

Fuel Retailer

Web application security audit of an online competition

Insurance Group

Penetration test of a selection of systems in the internal network

Bank

Penetration test of various systems in the DMZ

Global Aviation Group

Interface audit of a message routing application incl. web interface & SOAP service penetration test and infrastructure security scan

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts