199819233_337155574695827_6454862387118555969_n_edited.jpg

OUR SERVICES

Even businesses with well-trained security personnel and cutting-edge technology are vulnerable to new threats. There are major hacker groups that use botnets to carry out sophisticated cyberattacks. Internal cybersecurity employees can't possibly be aware of all present and potential hacking approaches. Only experienced penetration testers have the necessary expertise to ensure clients' high resilience to known dangerous hacking techniques.

security (1).png

Penetration testing

Organization’s infrastructure is tested for vulnerabilities. There are three types of testing techniques: White Box, Black Box and Grey Box. In the first case the testing is done with full access to the source codes/resources of the company. During Black Box testing the specialist has almost no information on client’s infrastructure. Grey Box testing is done with only partial knowledge of the client’s internal structure. Mostly our services cover web application and network testing.

padlock.png

SAP SECURITY TESTING

This service includes client's SAP environment testing for vulnerabilities and bugs. Our team will conduct a Security Audit (whitebox security assessment and blackbox pentest), of the Customer’s SAP environment. As a part of these services our clients will perform assessment of the Customer’s SAP environment, attempt to gain maximum possible access, escalate privileges in connected systems, analyze the potential risks for organization, demonstrate the ways an attacker can access mission-critical data or processes; and summarize recommendations on enhancement of the system and its components’ security.

cyber-security (1).png

NETWORK TESTING

Network testing is concentrated on the network perimeter, which is being tested for vulnerabilities. Client's web application or web servers will not be tested during this service.

cyber-security.png

SOCIAL ENGINEERING

During Social Engineering service, employees of the client’s organization are tested. The human factor can have a very serious impact on your company’s security. Most of the attack vectors start with an e-mail that can have malicious scripts injected in them, thus giving the attacker access to employee’s workstation. Because of that, it’s very important to educate every employee about the potential risks and ways to mitigate them in case of an incident.

target_edited.png

REVERSE ENGINEERING

Our team will test the client's desktop application for bugs and vulnerabilities during reverse engineering, without having the source code of the application available.

999437-200.png

MOBILE APPLICATION PENETRATION TESTING

We will test client's mobile application (Android or IOS app) for bugs and vulnerabilities, during mobile application penetration testing.

internet-security.png

IOT PENTESTING AND SECURITY AUDIT

During this service we will test client's IOT device is tested for hardware and software vulnerabilities and bugs. 

shield.png

SECURITY AUDIT

This service fully covers the client’s information security needs. During the audit all of the aspects of the organization that are connected to confidential information can be tested. That includes the organization’s policies regarding information security, employee “hygiene” in the digital world, and all of the services that are listed above. (except Social Engineering services)

maps-and-flags.png

ADDRESS

6th floor, Teryan 105/1 National Polytechnic University of Armenia, 10th building, Yerevan 0009

telephone-call.png

CONTACTS

Tel.: +374 11 21 97 87
E-mail: [email protected]

COMMUNITY/MEDIA

  • Facebook
  • Twitter
  • LinkedIn