Security Analysis

 

Within the scope of conducting a security audit, we analyze your software, hardware, infrastructure of networks, and IT processes, focusing on identifying vulnerabilities, risks and potential for threats … before others do so!

 

 

Software

 

Our software audits examine automated and manual source code reviews as well as:

 

  • vulnerabilities to exploit techniques

  • compiler and linker options

  • runtime environments and protection

  • build and versioning processes

  • software architecture

  • data classifications

  • interfaces, ports and protocols

  • cryptographic algorithms

 

 

Hardware

 

When we examine hardware, our special focus is on:

 

  • Vulnerability Assessments

  • System Hardening

  • Secure Configuration

  • Patch Management

 

 

Network

 

If a hacker has accomplished an intrusion, he or she will try to jump from server to server to penetrate more and more deeply into your company's network.

 

While auditing the structures of your network, we check whether your applications are seggregated properly and designed according to the “least privilege principle”.

 

 

Ethical Approach

 

With your explicit permission, we will also apply of strategies from the area of

“ethical hacking”, for example:

 

  • Exploiting

  • Cracking

  • Man-in-the-Middle-Attacks

  • Reverse Engineering

  • Fuzzing

 

 

Our audits conclude with a detailed report, the creation of an action plan, as well as recommendations for mitigating the identified risks.

 

Of course, we are happy to develop a solution for a secure architecture of software, hardware, network and IT processes subsequently.

ManufakturIT GmbH    |  +49 (0)2202 1882273   |  info@manufaktur-it.de