References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Private Bank

Penetration test of a mobile and a web application to view various financial portfolios. Additionally, the configuration of the web application firewall in use was reviewed.

Energy Company

Security audit of the control network and telecommunication network by means of SCADA/ICS penetration tests, application penetration tests, firewall ruleset reviews, network tracing and architecture and configuration reviews

IT Company

Test of isolation measures for a dedicated network zone

Cantonal Bank

Security scan of public IP addresses as well as firewall ruleset audit and WIFI audit

Private Bank

Technical security audit with external security scan, web application penetration test, and test of the email infrastructure as well as a review of the firewall rules and conducting awareness training

Technology Group

Review of the implementation of a new network concept including a design & configuration review, a firewall ruleset review and partial penetration tests

Hospital Group

Conducting a security audit including several technical audits, an architecture and design review as well as a workshop on security-related decisions for future products and services and extending the current infrastructure

Private Clinic

Technical security audit of the IT infrastructure, including a vulnerability scan of the internal and external infrastructure as well as an audit of a Windows 10 client. Additionally, a review of the firewall configuration and mail infrastructure was performed.

IT Company

Test of isolation measures for a dedicated network zone

Energy Company

Comprehensive security audit of a network that belongs to an energy center

Asset Management Company

ISMS status review, architecture review of the entire network infrastructure and security configuration review of the cloud, firewall and VPN security configuration

System Provider

Conceptual and technical analysis of the infrastructure for a platform for secondary and tertiary reserve capacity and balancing capacity by means of a Security Architecture & Design Review, Firewall Ruleset Review and Penetration Tests

Biotechnology Company

Architecture and design review, incl. audit of the firewall rules, of the production networks for a chemical plant

Private Bank

Conceptional and technical analysis of a documentation management system

Food Trade Organization

Security assessment of the entire IT environment through an architecture review, penetration test of the mail environment and internal client as well as a scan of all externally reachable systems

Biotechnology Company

Architecture and design review, incl. audit of the firewall rules, of the production networks for a chemical plant

Energy Provider

Architecture and firewall review for a smart meter advanced metering infrastructure (AMI) and a customer portal

IT Services Provider

Holistic audit of all applications of the core banking system including access control via firewall ruleset review and audit of reverse proxies. The applications were checked by means of application penetration tests and source code reviews

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 12:00 p.m. and 1:00 p.m. – 5:00 p.m (exception: customers with SLA – please call the 24/7 IRFA emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts