Hospital Group
Configuration review of two application server
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Audit of an IoT Linux system with a focus on local privilege escalations
Web application penetration test of an application to administrate over one million IoT devices
Consulting and support in the development of a Security Operation Center (SOC)
Server and firewall configuration review, penetration test and a technical review of the terminal devices
Comprehensive audit of a new interface platform by means of an architecture, design and configuration review including a web application penetration test
Review of 10 security policies (information security policy, IT acceptable use policy, physical security, inventory, etc.) with focus on ISO 27002 and 27001
Web application penetration test of a collaboration platform including a configuration review
Creation of an information security policy as well as review of an IT acceptable use policy and an IT concept (incl. kick-off and workshop)
IT security audit (interviews and assessment) of new network infrastructure
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: