Plans


  • Automated Testing
  • Scanners to find technical issues
  • Combination of in-house developed proprietary, open-source & commercial tools
  • Specific tools depending on target infrastructure
  • Manual verification of all issuesNo false positives
  • Manual Testing
  • Mapping of business logic, data flow and workflow, network and relationships
  • Test cases and attack scenarios based on network map
  • Reverse engineering of application functionality
  • Identification of design and logic vulnerabilities
  • Impact analysis through exploitation and network propagation
  • Integration
  • Correlation of data from multiple tools and sources
  • Reference issues against private and exclusive vulnerability sources
  • Reporting
  • Custom developed report specific for your network infrastructure
  • Detailed fix information for your specific platforms
  • Detailed proof of concepts with thorough explanations
  • Rapid









  • Comprehensive