Apr 4, 2014|Networking & Security|$247|Completed
Mobile, Web and Application Security Services
Threat Modeling - The threat model is the most important thing to have for your application. It maps out the attack surface, allowing you to make security concious design decisions.
Penetration Testing - This service pits an attacker against against a product, in order to find security related bugs.
Attack Simulation - For larger clients that have many networked assets, the attack simulation provides a 'Red Team' style service. Everything which the company owns is under scrutiny; however testing which could cause a Denial-of-Service is avoided unless specifically requested.
Code Review - You have an application that is already built, and would like to eliminate dangerous bugs in the code. You want a Code Review.
Security Architecture Review - Ensure that your application has a proper design.
Digital Forensics - Discover how your website was hacked, and how to patch the website.
Read More »