Application

With the number of reported compromises escalating daily, along with the severity and costs associated with rebuilding the brand thereafter, applications present a prime target for attack and a huge worry for those securing them. Whether your applications are off-the-shelf or have been custom developed, several common themes continue to put the integrity and confidentiality of your corporate information and systems at risk. They are time constraints and inappropriate training around secure application coding and development.

To help you address these failings, our highly skilled consultants, many of whom have come from software development and coding backgrounds, will analyse all the key components of your applications. We adopt comprehensive, standardised methodologies that combine automated scanning tools, customised proprietary scripts and manual techniques; and test for exploits that could allow a compromise including those relating to PCI, the Sans Top 25 and OWASP Top 10.

We deliver:

  • A detailed report for your Executive, Management and Technical audiences
  • Identification of good practices found in the environment along with weaknesses
  • Prioritized results sorted by severity of risk
  • Vulnerabilities reported against CVSS2, the OWASP Top 10 and SANS Top 25
  • Recommendations on how to fix vulnerabilities and reduce your risks based on best practice, our experience and your unique business requirements
  • Guidance on ways to ensure compliance with regulations and industry mandates
  • Briefing session with your chosen team to guarantee understanding