Penetration Tests
We support our Clients in pursuing the highest IT security standards
Ask for a quoteWe evaluate security level of IT systems and applications. We also test their compliance with client's security requirements. Besides identifying vulnerabilities we verify business logic implementation (e.g. workflows) and security mechanisms (e.g. access control). We have wide experience in testing of solutions in the following areas: web and mobile applications (iOS, Android, Windows Phone), network devices and services, operating systems (Unix/Linux, BSD, Microsoft Windows, OS X), thick-client software, and embedded systems.
Source Code Analysis
We provide low-level software vulnerability analyses
Ask for a quoteOur vast experience in security research lets us carry out in-depth audits of the source code. During such low-level assessments (based on a so-called white-box methods) we can report bugs which are invisible with a high-level approach (i.e. black-box). We are fluent in the following programming languages: C, C++, Objective-C, PHP, Java, Python, and Perl. Our researchers also demonstrate a remarkable level of expertise in discovering backdoors (i.e. hidden methods of gaining unauthorised access to a system).
Vulnerability Assessment
We verify the level and scale of the infrastructure vulnerability
Ask for a quoteWe analyse the level of security of servers and network devices both publicly available and internal ones. We identify and assess vulnerabilities of network services running within the operating systems, network devices and other type of IT equipment. The results are evaluated to sift off the false positives and to bring a valuable and high-quality account of the level of PCs, servers and network devices' security.