Over 400 organizations (including several Fortune Global 500 companies) in Europe and overseas and across all industries trust our vendor- and product-independent cyber security services.

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Due to the increased sensitivity we do not state or list here any references of the 150+ projects in the fields of digital forensic examinations and expert’s reports.

The majority of our projects since 2003 is listed in the overview, which includes IT forensics projects in the context of company security trainings and concepts.

2018

Cantonal Bank

Annual security review of the internal and external networks, consisting of WLAN audit, penetration test of various critical infrastructure, security configuration review of the Active Directory, traffic analysis, security review of the PC workstation, application penetration test of an e-banking solution as well as an online mortgage tool, a DNS tunneling test, a penetration test on VoIP devices as well as advanced mail tests on the mail server

Switzerland

Manufacturer of Injection Systems

Audit of the independent network set up for external software developers. The audit focused on the impact of a compromised IoT device on the rest of the corporate network, the security of WLAN access, and the possibilities that a malicious software developer with extended rights would have

Switzerland

Approval and control Authority

Penetration Test of a reporting platform and a vigilance system

Switzerland

Service Provider in the Energy Sector

Audit of a Single-Sign-On solution

Switzerland

Cantonal Hospital

Technical and conceptual audit of an Enterprise Mobility Management (EMM) solution

Switzerland

Bank

Security audit of the OAuth interface for connecting third party application to the e-banking solution. The Audit included a web application security audit for the customer facing part and a security configuration and conceptual review for the other parts

Switzerland

Insurance Group

Security configuration review and penetration test of a Skype for Business infrastructure

Switzerland

Cantonal Bank

IT security audit of central components by means of a privileged and unprivileged penetration test of the remote desktop/Citrix solution, the firewall configuration including the defined rules as well as a configuration review and penetration test of the WLANs used

Switzerland

Insurance Group

Technical and conceptional security analysis of an intrusion detection solution

Germany

Olfactory large industrial enterprise

Security design, security configuration and security architecture review as well as a physical security walkthrough in a factory

International

Hospital Group

Security design, architecture review, audit firewall ruleset and security configuration review of the involved clients in a radio oncology department

Switzerland

Private Bank

Assessment / review of a solution for meeting room management

Liechtenstein

Tool Manufacturer

Configuration review of the central firewall including the defined administrative processes

International

Private Bank

Audit of a network-infrastructure (configuration, design, penetration test)

Switzerland

Out of Home Advertiser

Security Audit of the IT infrastructure with different point of views; security scan & penetration tests of DMZ systems, advanced mail tests, review of the architecture (including technical tests on VLAN segregation) and security configuration review of the firewall

Switzerland

Hospital

Checking the external attack channels of using security scan on the servers accessible via the Internet, firewall ruleset audit and advanced mail test

Germany

IT Provider

Security configuration review and penetration test of a Windows Server 2016

Germany

Cantonal Hospital

Penetration tests from different vectors and WLAN configuration verification

Switzerland

Cantonal Administration

IT security audit of a collaboration environment by analyzing various concept documentations (ISDS concept, architectural concept and user authorization concept) and various configurations (firewall, load balancer and SharePoint), which were supplemented by a technical penetration test

Switzerland

Private Bank

Application penetration test & security configuration review of the interface between cloud solution and internal solution

Switzerland

page  2  of  9