Over 400 organizations (including several Fortune Global 500 companies) in Europe and overseas and across all industries trust our vendor- and product-independent cyber security services.
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Due to the increased sensitivity we do not state or list here any references of the 100+ projects in the fields of digital forensic examinations and expert’s reports.
Application security audit CRM (incl. documentation review, network tracing, firewall ruleset and configuration review)
Security audit (configuration review and partial web application security audit)
ICT Outsourcing Company
Web service security audit (penetration test and configuration review of a central information gateway)
Security audit cloud platform (security check via interviews, topology and configuration reviews, application security audits and penetration tests)
Security audit Windows Server 2012 (security test of the image via configuration review and penetration test)
Application security audit of a credit card application (incl. configuration review of the involved systems)
Application security audit of a customer management solution (incl. reverse engineering and configuration review)
Security audit (penetration test of the firewall, firewall rule set review and VPN configuration review)
Security Service Provider
Application security audit of the secure mail platform (incl. configuration review)
Security audit Windows XP (security check of the notebook image incl. harddisk encryption via configuration reviews and penetration tests)
Security audit mobile communication (configuration reviews of the policy and synchronization infrastructure and firewalls, penetration tests of servers, gateways and firewalls as well as traffic analysis)
Technology Company for the Global Construction Industry
Security audit Windows 7 (security test of the SP1 client images via configuration reviews and penetration tests)
Security audit RAS solution (remote penetration test and configuration review)
Security audit VPN gateways (penetration test from the external view and configuration review)
Penetration test and configuration review of a Session Boarder Controller (SBC)