Product Security Testing
Whether it's going to be an estate wide implementation, shopping for new security products or an internally developed solution, our product security assessment will help you to alleviate your security concerns
Whether it's going to be an estate wide implementation, shopping for new security products or an internally developed solution, our product security assessment will help you to alleviate your security concerns
Introducing a new product to your environment may bring surprises, if considered without cybersecurity on the mind. This includes anything from a custom off-the-shelf software to the network products, security solutions. You must consider how a new product will stand up to an attack particular to your environment variables.
A few examples include evaluating new security software, VPN/mobile applications, smart devices and/or software. The overall goal is to find out product weaknesses , demonstrate the extent of threats posed and help our clients address those issues particular to their environment.
We have a dedicated security assessments FAQ section. Read it here.
Product assessments help you to assess if product owners/third-party vendors have developed the product with security in mind. Any issues identified will help you to liaise with your vendors to help secure yours and their products.
We take customer communication as seriously as reporting or assessment execution. We engage with customers during all stages, and ensure that customer contacts are up to date in the language they understand. Post engagement, a free debrief is conducted to help the customers understand the weaknesses and prepare a mitigation plan.
The assessment-execution phase is followed by the analysis & reporting. Defendza performs analysis on the testing output, evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels.
The business logic for the entire application must be reviewed. This is only possible after gaining an understanding of how the application behaves for different privilege levels. From the threat-modelling phase and the knowledge gained, our consultants will be in the position to exploit business logic level vulnerabilities that are often overlooked by the developers
Our consultants would focus on the top 10 categories of attacks defined by the industry-standard OWASP. This includes:
Authentication and authorization problems are prevalent security vulnerabilities. Most mobile apps implement user authentication. Even though part of the authentication and state management logic is performed by the back end service, authentication is such an integral part of most mobile app architectures that understanding its common implementations is important.
Web server hosting of the application is also considered a vital component during this testing. A weakness in supporting infrastructure including the configuration of the webserver could lead to a slight compromise of the application hosted on it.
This phase helps to
This is an important step towards gathering as much information as possible about the target application. This includes passively fingerprinting the CMS and obtaining data cached in Google about the technologies /web pages in use. Any data obtained during this phase helps plan the entire pentest properly
Our reports are comprehensive and include all the evidence that supports our findings. We give you a risk rating that considers how likely an attack is as well as the impact it could have. We don’t create panic scenarios. Our mitigation is detailed, covering both strategic and tactical areas to help our clients prepare a remediation plan.
Apart from the range of commercial and open source tools available for specific testing, our team has its own custom scripts for efficient testing. We provide accurate results to make sure our clients completely understand any vulnerabilities we report.
Our teams are led by veteran security consultants accredited by CREST standards for the last several years. Our experience shows that our clients are best served by giving them the right advice for their cyber security needs. We do not believe in spreading fear, uncertainty and doubt to generate more business.