More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Insurance Group

Penetration testing of a web application for an insurance provider’s claims reporting and processing website with the focus on OWASP’s API Top 10 list.

Pension Fund

Forensic investigation of an E-Mail and 3 Clients

Private Bank

Web Application Test of a Homepage and Web Application Firewall Configuration Review

Retail Group

Security audit of servers and Active Directory audit by a legal protection company.

Retail Group

On-site workshop for attacking and securing on-prem Active Directory as well as Azure and Azure Active Directory

Tool Manufacturer

Application penetration test of a backend system that creates PDF reports based on uploaded data and stores them in SharePoint


Cyber Defense Center Consulting

Insurance Company

Interactive awareness workshop for all employees divided into sessions on phishing, password security, mobile data carriers and ransomware, enriched with selected live hacking demos.

IT Service Provider

Security Audit of an On-Premise Active Directory with a Concept for an AD Tiering Model

Tool Manufacturer

Penetration test of an API endpoint and the associated configuration review of a tool vendor.

Cantonal Office

Penetration testing of a web application for posting and managing notifications

Cantonal Office

Client audits and vulnerability scans for a public office

Aviation Industry

Security review of a new CMS consisting of a conceptual review of the IT infrastructure as well as penetration tests and configuration reviews of the systems and applications.

Media Group

Penetration test of a moderation tool for online comments

Private Bank

Penetration test of the implementation of a new application to the current single sign-on (SSO) solution

Tool Manufacturer

Web Application Penetration Test and Mobile Application Penetration Test (Android, iOS) of an application for tracking working time


Review of two endpoint detection and response (EDR) systems for effectiveness and clarity

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

Add CSIRT to contacts