Over 400 organizations (including several Fortune Global 500 companies) in Europe and overseas and across all industries trust our vendor- and product-independent cyber security services.
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Due to the increased sensitivity we do not state or list here any references of the 200+ projects in the fields of digital forensic examinations and expert’s reports.
Audit based on individual requirements catalog
Technical security audit of the IT infrastructure, including a security scan of the internal and external infrastructure as well as an audit of a Windows 10 client. Additionally, a review of the mail infrastructure and a phishing campaign were performed.
Information security gap analysis based on ISO 27002
ISO 27002 audit with the involvement of IT partners, including the development of a security roadmap
Technical security audit of the IT infrastructure, including a vulnerability scan of the internal and external infrastructure as well as an audit of a Windows 10 client. Additionally, a review of the firewall configuration and mail infrastructure was performed.
Trustee Service Provider
IT audit based on IT General Controls (ITGC) and review of ISAE report
Conceptual security audit network zones
IT Consulting Company
Network-side audit of an ERP system using security and port scans
Travel and Transport Company
Security and compliance audit of a ticket system
Asset Management Company
ISMS status review, architecture review of the entire network infrastructure and security configuration review of the cloud, firewall and VPN security configuration
Security scan of internal and external systems and audit of a client system. Analysis of process security and creation of a BCM workshop
Cooling System Manufacturer
Internal security scan and ISO audit
Technical security audit of the IT infrastructure, including a vulnerability scan of the internal and external infrastructure as well as an audit of a Windows 10 client. Additionally, reviews of the mail and WLAN infrastructure, the internet proxy and the Active Directory.
Concept review and implementation review of an iOS and an Android application as well as the corresponding backend infrastructure
Review of a SOC/CSIRT concept and use cases to prepare a SOC evaluation
Mechanical Engineering Group
Security check of the company IT by means of vulnerability scans from external over the internet and from internal in the server network, as well as an audit of the processes according to ISO 27002
ISO 27002 security audit; analysis of the security level by means of a questionnaire tailored to customer needs, verification by means of an interview and document review; bespoke suggestions for improvements on information security incl. risk-based and prioritized measures
Conceptual security assessment according to ISO 27002
Intensive audit of an asset management portal: The scope of the audit included the web application, the associated Android application and the connected backends. The tests were performed both authenticated and unauthenticated
Conducting several combined technical and conceptual audits (incl. advanced mail test, Windows 10 client audit, ISO 27002 gap analysis, penetration test and configuration review as well as internal and external security scan) to assess the overall information security of the organisaiton