Immunity Systems’ scope of work is very extensive and includes a number of areas of security services execution (web applications, fat Immunity Systems uses proprietary methodologies in all these areas, which have been created by extending internationally recognised methodologies. In addition, Immunity Systems is constantly developing methodologies as well as expanding checklists assigned to specific areas and technologies used in them.
Security audits and tests
Security Audits and IT Security Tests are one of the most effective methods that verify the security level of your organisation’s IT systems. Immunity Systems has performed several hundred security tests of web applications, mobile applications and infrastructure, among others, since 2016. Immunity Systems uses proprietary methodologies in all areas, which have been created by extending internationally recognised methodologies.
Red Teaming
Red teaming are authorised attacks involving gaining accesses, escalating privileges to the highest possible, hardening accesses and finally achieving the goals listed by the client. Red teaming also includes sociotechnical attacks to physical security aspects.
Active dependency scan
A service that monitors sensitive parts of the application source code in the CI/CD process for security. In the event of a code change, e.g. to a part responsible for authentication or the addition of a library with a known vulnerability, actions ranging from the sending of a warning to the complete blocking of the implementation of changes to production servers are taken.
Post-breach analysis of an IT system
A post-hack analysis is the first step in finding the causes of an IT systems security incident. If you have a suspicion that your organisation’s cyber security has been breached and you want to know what methods the hacker used, what part of the infrastructure was subjected to the incident and collect evidence, contact the Immunity Systems team.