During a review, we focus on the security design and specific security components including configurations or source code. You will receive a second opinion from our analysts.
We analyze your concepts and identify factual and potential vulnerabilities. You can incorporate our recommendations for improving the overall security into the implementation.
Evaluation on Defense System
With reasonable effort, we examine the resilience of your information technology landscape against cyber incidents. The focus is on prevention, detection and response. For example, we check remote access or whether backups are sufficiently protected. We therefore rely on current attack patterns and the corresponding countermeasures.
Evaluation of Source Code
Our analysts manually evaluate critical components or specific security-related features of your application’s source code. This allows us to check the code for logical errors, which an automated scanning tool is not capable of doing.
Cloud and Configuration Analysis
Securing cloud infrastructures (for example, Microsoft Azure, Amazon Web Services and Google Cloud Platform), Internet traffic inspection, proxies, web application firewalls, spam filters and other security components is complex. Default settings and
thus insecure configuration are the norm. We therefore review these configurations and make suggestions which enable your IT professionals to implement secure best practices and raise the bar against adversaries.
We check your Windows and Linux operating systems for shortcomings and suggest improvements so that you can deploy a solid and secure base image. Exposed systems such as Active Directories and mobile devices are also particularly analyzed in detail.