• Running security tests.
• Testing internal and external systems and infrastructure.
• Simulation of possible attacks on applications and infrastructure.
• Analysis of the configuration of network devices, operating systems, databases and applications.
• Collection and presentation of data for penetration test reports.
• Risk assessment and development of recommendations related to detected vulnerabilities.
• Support in the process of implementation and maintenance of safety-related procedures.
Bringing knowledge into focus
Original methods and tools
It's all about the flextime
An office with ambience