Ergonomics, a leading Consulting Company in areas of Integrated Security, can support you in recognizing and resolving enterprise wide IT risks, dangers, and weak spots. Over the years, Ergonomics Security Consultants have gained immense knowhow – valuable in tackling the most challenging Organisational and Technical IT Security issues. On a daily basis, we deal with issues surrounding Secure IT Systems and Networks, Information Security Management, Data Protection, Crisis Management, Social Engineering, Security Concepts, and Security Audits. Our Consultants have a plethora of skills covering technical and business areas, and are therefore able to support you in defining your strategy and implementing it to a future state, or being your professional coach in close collaboration with you. International Credit Card organisations issue stringent security requirements to their contractual partners based on PCI Data Security Standard. Our Certified Security Auditors/Certified Security Assessors accompany you from analysis right up to implementation, and ensure that the highest security standards can be satisfied.
Technology:
Compliance (ISO 27001, PCI DSS), Schwachstellenanalysen, SCADA Security
Categories:
Security Consulting, General Security, IT Security Check, Encryption, Security Assessment
Together, we are going to fight cyber risk Starting from basic tools up to groundbreaking features we have created the ultimate platform to support you to fight the increasing risks of the digital age. Automation: Dynamic (DAST) and static (SAST) application security testing methods Best-of-breed methodology: Ideal usage and intelligent combination of the best available security testing tools Cost reduction: Drastic cost reduction due to maximized automation Vulnerability management: Simplified management thanks to comprehensive inventory and historization Integration possibilities: Seamless integration into existing business and development processes (CI/CD) Secure software development: Secure Software Development Lifecycle (SSDL) and DevSecOps, everything under one roof Flexibility: Security assessments at your fingertips Reporting: Reports tailored to the addressees in the formats you are familiar with
Technology:
N/A
Categories:
Application Security, IT Security Check, Security Consulting, Network Security, General Security
Company:
Services & Consulting: service
Penetration Tests
Price:
On request
Version:
N/A
Description:
What is the best way to test the security of your IT infrastructure, systems and organization? Exactly, with a hacker attack! During a penetration test, our Cyber Seurity experts perform a real attack. This shows whether the infrastructure is sufficiently protected against attacks from outside and inside and whether it is in line with the accepted residual risks. Our approach is based on the recognized methods OWASP, OSSTMM and ISO 27001.
Technology:
N/A
Categories:
IT Security Check, Security Assessment, Security Consulting
You are using a software application that is important to you, which was "developed in-house" and is getting on in years. Maintenance is proving to be increasingly problematic, as the developer is no longer within your reach and internal know-how is lacking. Now you are looking for an experienced partner to help you transform the old application into a new one.
Technology:
N/A
Categories:
General Development Tools, General Office Automation, IT Security Check, Business Process Management, Desktop
Company:
Services & Consulting: service
Bug Test
Price:
On request
Version:
N/A
Description:
Community bug test with 1-2 friendly hackers Comparable to an audit / pentest
Technology:
N/A
Categories:
IT Security Check, Security Consulting, Application Security
Company:
Services & Consulting: service
Focused Private Bug Bounty Program
Price:
On request
Version:
N/A
Description:
3-10 selected friendly hackers test your system First reports/bounties Fully managed program: We handle the triage, so you can focus on fixing vulnerabilities. (Triage = checking for duplicates and false positives, reviewing severity levels, reproducing bugs, etc)
Technology:
N/A
Categories:
IT Security Check, Security Consulting, Application Security
Company:
Services & Consulting: service
Wide Private Bug Bounty Program
Price:
On request
Version:
N/A
Description:
More comprehensive testing harnessing the power of the ethical hacking community Friendly Hackers apply to participate Fully managed program: We handle the triage, so you can focus on fixing vulnerabilities. (Triage = checking for duplicates and false positives, reviewing severity levels, reproducing bugs, etc)
Technology:
N/A
Categories:
IT Security Check, Security Consulting, Application Security