CASE STUDIES

In the IT-security business privacy is a top priority where no company wishes to share details about how someone managed to divert an entire customer database during a penetration test. However, to show you how we can help you business strive we have prepared a few case studies based on previous missions. All names are confidential, we explicitly value the privacy of our customers and we remain subject to treat our customers identity in full confidence.

Industrial espionage

Some quick example text to build on the card title and make up the bulk of the card's content.

Securing e-health

Some quick example text to build on the card title and make up the bulk of the card's content.

hotell penetration test

Some quick example text to build on the card title and make up the bulk of the card's content.

         
    

Retail -

Some quick example text to build on the card title and make up the bulk of the card's content.

Realtime Firewalls

Some quick example text to build on the card title and make up the bulk of the card's content.

Securing IoT

Some quick example text to build on the card title and make up the bulk of the card's content.