Produse pentru testează (5)

Testare de penetrare a rețelei

Testare de penetrare a rețelei

We test the security of your network to check its resilience against unauthorised access attempts. In the first stage, we use scanning and attempt to bypass security using specialised tools. To that end, we use exploits that use various software vulnerabilities and configuration errors. Thanks to these, we can identify vulnerabilities and issues in your network that can potentially be used by criminals.
Inspecția uneltelor - Testăm uneltele tale importate

Inspecția uneltelor - Testăm uneltele tale importate

Unsere Spritzgussabteilung ist auch an der Prüfung von Spritzgusswerkzeugen beteiligt. Wir testen Spritzgussformen für Werkzeugbau und Kunden, die Formen importieren, z.B. aus China. Neben der Werkzeugprüfung beurteilen wir auch die Ausführungsqualität, prüfen die Übereinstimmung der Bauunterlagen mit dem Ist-Zustand und eventuelle Änderungen der Formen.
Testare de penetrare a aplicațiilor web

Testare de penetrare a aplicațiilor web

We test your web applications to detect issues that could lead unauthorised third parties to take control of them. Our methodology allows us to identify vulnerabilities from OWASP TOP 10 list – the Top Ten Web Application Security Risks. With that, you can make sure that your applications meet international security standards.
TESTAREA MOLDURILOR DE INJECTIE - testarea uneltei tale

TESTAREA MOLDURILOR DE INJECTIE - testarea uneltei tale

Our injection department is also involved in injection molds testing. We test injection molds for tool shops and customers who import molds, e.g. from China. In addition to tool testing, we also assess the quality of workmanship, check the compliance of the construction documentation with the actual state and possible modifications to the forms.
Testare de penetrare a aplicațiilor mobile

Testare de penetrare a aplicațiilor mobile

Our mobile application security tests check whether users of your mobile application or outsiders can cause harm to the company or other users. There are a number of things we focus on, including data storage and authentication procedures, which are often used by criminals for identity theft and hacking. We find vulnerabilities in mobile application security and provide recommendations on patching them out.