A chain is as strong as its weakest link. Do you know how strong all your links are?

It is too late to think of security after a breach has occurred and the damage has been done. Your solutions need to be built with security as a centerpiece in their architecture.
We operate under solid security standards and involve our security engineers in each software piece we produce. Our consultants are ready to engage in any stage of you solution’s development, from start and after release.


There are three major ways to engage in security in an existing IT landscape:

  • White Box – you provide full information and access to the systems in scope.
  • Grey Box – you provide information about the system in scope.
  • Black Box – with your consent we exploit your systems with no access or information.


Depending on your needs and how much access you are willing to provide we will consult you and agree together on the best approach.


Our penetration testing or ethical hacking services focus on:

  • Network – firewall, VPN, access points, switches, routers, protocols etc.
  • Infrastructure – storage, virtualization, servers etc.
  • System software – operation systems, vulnerabilities and exploits in Web Servers, Application Servers, Databases, Reverse Proxies, Web Caches etc.
  • Application security checks:
    • Web systems – standard CMS-based websites (Joomla, WordPress, etc.) and custom, enterprise and open source-based systems.
    • Ecommerce – custom and proprietary platforms (Magento, Hybris, Bigcommerce, Shopify, OpenCart, PrestaShop etc.)
    • Mobile applications – custom, hybrid, native.
    • Cloud applications – supporting Amazon Web Services (AWS), IBM Bluemix, and Microsoft Azure, SAP Cloud.


I would like to check my security!