Informatic security
We help you determine if your company's applications and systems have exploitable flaws that could endanger the technological environment.
We will deliver comprehensive and understandable reports that include basic decision-making guidelines for the staff responsible for the design of the functional application, as well as specific instructions for developers and administrators of the technological environment.
List of services:
1. Penetration tests of external services.
2. Penetration tests of internal services.
3. Penetration testing of web applications.
4. Penetration testing of mobile applications.
5. App penetration test.
6. Advanced persistent threat attack test.
7. Cloud architecture and configuration security review.
8. Security review of mobile device security settings.
9. Database server security review, network infrastructure security review.
10. Virtualization Infrastructure Security Review.
11. Wi-Fi network penetration testing.
12. Proof of data leakage.
13. Sensitive identification of data.
14. Code review.
15. Impersonation.
16. Response to incidents.