Insurance Company
System audit (Technical security check of a client-image for notebooks)
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
System audit (Technical security check of a client-image for notebooks)
Security audit (conceptual and technical security check of an IT infrastructure)
Security audit (conceptual and technical security check of an IT infrastructure)
Synchronization basic services (gap-/feasibility study about the consolidation of the IT basic services of various country subsidiaries)
Web application security audit (technical inspection of the implementation of the measures by privileged and unprivileged tests)
Review of a security concept and of the guidelines for use of information technology as well as the development of an IT surveillance guideline
Web application security audit (remotely conducted security assessment of the application with special focus on the e-mail token function)
LAN penetration test (onsite penetration test, installation and short introduction of the security scanner Nessus and related training of the client’s project team)
DMZ & LAN IT security audit (security audit by security scans in the LAN and in the DMZ and penetration tests of various web applications and of the website)
Implementation of the IT security management process (comprehensive realization of all process steps incl. detailed auditing of a complex web area)
Software evaluation (evaluation of information security management system software)
LAN penetration test & conceptual audit (onsite penetration test and organizational and application baseline analysis)
Web application security audit (security check of a multi-tenant capable web based facility management solution)
Security audit RAS solution (remote penetration test and configuration review)
Solution evaluation and preparation of the RFP document in the IT network field
Coaching related to the development of the IT strategy and the IT security guideline (ISO 27002-compliant)
Application audit (holistic examination of a client server core application with foci functionality and IT security)
Security review (comprehensive conceptual and technical security check conducted by document grinding, penetration tests as well as network tracing and firewall rule set audits)
Coaching of the client by means of a web application security audit of the client’s application
Web application security audit (technical security check of a client portal)
Security audit (remote penetration test of the systems in the DMZ, footprinting and war driving)
No results found.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here:
Don’t miss anything! Subscribe to our free newsletter.