Cantonal Tax Administration
Application security audit (comprehensive technical security check of the core business application)
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Application security audit (comprehensive technical security check of the core business application)
Web application security audit (security check of an application and the VPN access)
Web application security audit (in-depth technical security check of a CMS and various international websites)
Application security audit (comprehensive security check of an appliance incl. reverse engineering)
Security audit (conceptual and technical security check of a printing platform)
Security awareness speeches (awareness training of all employees by three target group-oriented speeches)
Security review (comprehensive conceptual and technical security check conducted by document grinding, penetration tests as well as network tracing and firewall rule set audits)
IT strategy coaching (incl. wording of the document)
Security audit DMZ (technical security check by remote conducted security scans and penetration tests)
Security audit (technical security check of the IT infrastructure by remote and onsite conducted security scans and penetration tests)
Security audit (conceptual and technical security check of a LDAP infrastructure)
Security audit (comprehensive security check by remotely conducted application security audits and security scans in the LAN)
Server analysis (analysis and disinfection of a malware infected server)
Penetration test (technical security check of the gateway infrastructure by remote conducted penetration tests)
Security audit (conceptual and technical security check of a mobile infrastructure)
Red teaming (technical security check of the IT infrastructure by targeted hacking attacks with the aim to discover design based security holes)
Conceptual security audit (review of the security-related documents and processes by means of document grinding, interviews and gap analysis and proposition of measures)
IT security coaching related to the consolidation and the development of the IT security guideline (according to ISO 27002)
Server analysis (analysis and disinfection of a malware infected server)
No results found.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here:
Don’t miss anything! Subscribe to our free newsletter.