Um dem Vertrauen unserer Kunden gerecht zu werden, veröffentlichen wir keine Kundennamen. Nachfolgend finden Sie einen Auszug an unterschiedlichen Projeken, die wir für unsere Kunden durchgeführt haben:

Security assessment of security- and privacy-related issues concerning Google Chromebooks in a corporate environment

Q2 2016

Penetration test of an industrial network, including components, like VPN, HMIs, PLCs, engineering work station, etc., in a lab environment

Q2 2016

Vulnerability scanning workshop and consultation during internal vulnerability scans

Q2 2016

Review and re-design of the company's internal network design and recommendations for additional security measures

Q2 2016

Re-check of an internal, online PKI center (HSM, Java application server and infrastructure assessment)

Q1 2016

Penetration test of an electric power transformation substation's internal network including infrastructure components, SCADA and control systems

Q1 2016

Penetration test of a third-party one-time-pad (OTP) solution for mobile devices (app) and desktops

Q1 2016

Grey-box penetration test of several internal high-profile targets within the network, including infrastructure and web-based checks

Q1 2016

External penetration test of the backend of an online banking solution

Q1 2016

Large-scale (> 6.000 IP addresses) black-box scanning with identification of vulnerabilities

Q1 2016

Support in the development of user and security guidelines for a web-based administration system

Q4 2015

Penetration test of a third-party system and network monitoring appliance

Q4 2015

Advanced penetration testing training for the company's development and security team, especially adapted to the company's needs

Q4 2015

Review and re-design of the company's internal network design and security policies

Q4 2015

External grey-box assessment of various internet-facing web sites of the company

Q4 2015

Internal white-box security assessment to secure an application used to communicate health-related information to public authorities

Q4 2015

External black-box assessment of internet-facing systems (intranet, e-learning, etc.) including infrastructure and web-based checks

Q4 2015

Penetration test of an ISP infrastructure from the viewpoint of an end-user (modem SW/HW hack, infrastructure check, …)

Q3 2015

External black-box check of a banking infrastructure

Q3 2015

Grey-box check of a web application for administering job applicants and members

Q3 2015

Assessment of an application written in Microsoft Excel

Q3 2015

Security check of an enterprise source code management platform fully integrated into Windows environments (Thick Clients)

Q3 2015

Grey-box check of a web application to manage power line customers

Q3 2015

Internal grey-box assessment of a business intelligence / warehouse environment

Q3 2015

External penetration test of a time registration web application for employees

Q3 2015

Penetration test of public transport system (management network, SCADA and vehicle control network)

Q2 2015

Grey-box check of an internal network and its PKI infrastructure

Q2 2015

Black-box check of an internal network

Q2 2015

External grey-box check of a financial treasury application

Q2 2015

Internal grey-box check of a fleet management system (telematics system)

Q2 2015

Internal white-box assessment of SCADA networks

Q1 2015

Tiger Team Assessment targeting the internal network, VoIP systems, mobile clients and dedicated offices and additional phishing campaign

Q1 2015

Security assessment of a hardened notebook installation for high-secure applications

Q1 2015

External black-box scan of all available Internet-facing systems of an enterprise

Q1 2015

Grey-box check of support portal for customers

Q4 2014

External black-box check of the company website

Q4 2014

White-box check of a secure environment for key and password storage

Q4 2014

Grey-box check of a data exchange platform for military and industry

Q4 2014

Grey-box check of an assessment platform for job applicants

Q4 2014

Grey-box security assessment of SCADA and PCL control network in transportation

Q4 2014

Grey-box check of a platform for managing orders and customers

Q3 2014

White-box assessment of a physical access control system and procedures

Q3 2014

Grey-box assessment of a satellite communication system for hazardous environments

Q3 2014

White-box physical security walk-through of the company’s head quarters

Q1 2014

White-box assessment of an internal payment solution and corresponding processes

Q1 2014

External black-box scan of all available Internet-facing systems of an enterprise

Q1 2014

White-box IT security assessment of live SCADA environment (power plant)

Q4 2013

External black-box security check a new company website

Q4 2013

Black-box assessment of a new Typo3 website for clients

Q4 2013

Reverse engineering of a BMS application (for physical access control, doors, bars and gates)

Q4 2013

Grey-box security assessment of a third-party remote administration software

Q4 2013

Re-check of a social media platform for large corporations

Q3 2013

Security awareness training for local security personnel

Q3 2013

Large-scale (> 18.000 IP addresses) black-box scanning with identification of vulnerabilities

Q3 2013

Tiger Team Assessment on a production facility for off-shore energy production to steal production plans

Q3 2013

Grey-box security assessment of an online bidding platform

Q3 2013

Tiger Team Assessment of a data center to gain physical access to the server room

Q3 2013

Grey-box security check of a mobile solution for order management

Q2 2013

Grey-box security assessment of an internal registration authority (RA)

Q2 2013

Penetration testing workshop to educate an internal team to conduct security assessments

Q2 2013

Grey-box security check of a web-based solution for management of excavations

Q2 2013

Grey-box security check of an online shop before its go-live

Q2 2013

Grey-box security assessment of an online-solution for order management

Q2 2013

Security architecture review of a customer self-service portal during development phase

Q1 2013

Grey-box assessment of an application running on SAP Enterprise Portal

Q1 2013

Black-box security assessment of a third-party, high-class video conferencing solution

Q1 2013

Large-scale black-box DMZ scanning with identification of vulnerabilities

Q1 2013

Grey-box security assessment of GPS location services

Q1 2013

Grey-box Tiger Team Assessment on a data center to gain physical access to the server room

Q4 2012

External black-box IT penetration test (infrastructure and web)

Q4 2012

Black-box assessment of an internal IT infrastructure

Q4 2012

Grey-box web assessment of a social media platform for big companies

Q4 2012

Grey-box assessment of an online platform for banking services

Q3 2012

Grey-box web application assessment of an online shop for end customers

Q3 2012

Grey-box assessment of an online portal for sales

Q3 2012

Black-box security check of a dedicated list of corporate websites including Denial-of-Service tests

Q3 2012

Grey-box security assessment of a self-service online portal for end users

Q3 2012

White-box physical security assessment and practical Tiger Team Test on dedicated security personnel

Q3 2012

Grey-box assessment of a single sign-on solution from the intranet for intranet applications

Q2 2012

Black-box assessment including reverse engineering of a Windows application used to manage large-scale Windows AD services

Q2 2012

Grey-box security check of a third-party remote VPN solution for the company

Q2 2012

Grey-box security assessment of a third-party mobile management platform

Q2 2012

Grey-box assessment of a Windows rich client application using web services

Q2 2012

Black-box assessment of the company's infrastructure and web applications accessible from the Internet

Q1 2012

Grey-box web security assessment of a cloud-based environment including in-house developed services

Q1 2012

Security analysis of the usage of Microsoft Outlook Web Access on untrusted clients

Q1 2012

Audit of a Microsoft SharePoint environment including some web applications for reporting

Q1 2012

Grey-box security assessment of SCADA power components (transportation)

Q1 2012

Black-box assessment of the external infrastructure and the online services provided by a company

Q1 2012

Tiger Team Assessments to test the overall security of an enterprise's proprietary research data

Q4 2011

OSINT analysis of a big company to identify possibly leaked company data on the Internet

Q4 2011

Grey-box infrastructure- and web application assessment for customer portals

Q3 2011

Grey-box infrastructure- and web application assessment of a new online platform

Q3 2011

Theoretical and practical security analysis of social media integrations

Q3 2011

Advanced IT Penetration Testing training for security consultants and penetration testers

Q3 2011

Grey-box security assessment of an electronic brokering platform

Q3 2011

Grey-box assessment of two user administration web applications

Q3 2011

Content Management System (CMS) audit and analysis of the company's website

Q3 2011

Grey-box assessment of a Microsoft SharePoint application

Q2 2011

Risk analysis workshop for a product in the development phase

Q2 2011

Grey-box web application and infrastructure assessment

Q2 2011

Large-scale black-box DMZ scanning with identification of vulnerabilities

Q2 2011

Internal grey-box SAP Enterprise Portal application assessment

Q1 2011

Review of group policies

Q4 2010

Infrastructure / SAP audit (DMZ) and web application audit of a customer portal

Q4 2010

Black-box server infrastructure, Typo3 and website assessment

Q4 2010