IT-security matching your needs

WEB PENETRATION TEST

Put your web application to the test and receive recommendations on how to mitigate the vulnerabilities

SOURCE CODE REVIEW

Detect and mitigate vulnerabilities in your application directly based on your source code

SECURITY CONSULTING

Receive sprint based guidance for your development team to build internal expertise and ensure security from the get go


WEB PENETRATION TEST

WHAT

An experienced web application penetration tester will conduct real life attacks on your application to see where the most viable attack vectors lie.

HOW

Conducted in either a structured way in accordance with ASVS/OWASP Top 10 or customized to the application that is being analysed.

OUTCOME

A detailed report outlining the vulnerabilities with their CVSS score and evaluation of their criticality in the context of the application. Actionable recommendations will provide guidance on how to mitigate the vulnerabilities.

SOURCE CODE REVIEW

WHAT

Our source code reviews in Python, TypeScript, JavaScript and Java present an additional angle to penetration tests as they allow to detect critical vulnerabilities based on analysis of the code.

HOW

Full access to the source code and close interaction with the development team, provide deeper insights into the application and can reveal vulnerabilities that might go unnoticed in a backbox test.

OUTCOME

Profoundly analysed source code to provide additional context to the penetration test. Detected vulnerabilities will be presented as part of the penetration test report.

SECURITY CONSULTING

WHAT

Instead of treating security as an afterthought, receiving consulting during the software development life cycle increases security from the get go and reduces time and cost for potential rewrites.

HOW

A security expert will attend the sprint planning meetings, point out critical aspects in development and offer guidance and review on implementation.

OUTCOME

Increased security of your code base and architecture. In addition to that, a vulnerability management that allows the development team to accept vulnerabilities will be established.