Companies are more and more dependent on data. Be it for sales,
R&D, or their actual product portfolio. Protecting this data is
vital, and often also compulsory (for instance when it concerns personal
information). Data is accessed by authorised users through applications
that contain business logic and security functions. If any weaknesses
exist in these access layers, then risks will arise to the business. In
order to be in control of these risks, it is necessary to assess the
security measures by testing their effectiveness.
Within our methodology we use various tooling and phases, such as
reconnaissance, threat assessment, vulnerability assessment and
We record the outcomes of the security test in a clear report with a
concise management summary, an extensive risk analysis for each outcome
and recommendations on a strategic, tactical and operational level.