ID Theft Protect Process & Engagements

 

Our Project Process

Applies to both mobile & Windows projects:

 Dedicated Mobile Security and or Windows Security Specialist

 Agree project milestones - technical and non-technical 

 Theoretical research and practical testing - includes coding examples and PoC

Full report / Checklist  - mobile App and Windows software 

 

Our Engagements

Examples of some recent engagements:

Windows .MSI analysis (WARE) with supported Software Analysis Checklist (SAC) 

 Static and dynamic analysis of Android App / SDK using AppSec Analyzer platform

 Mobile encryption roadmap review and identify gaps including attack vectors (US bank)

 Mobile App / SDK threat intelligence report (leading security vendor)

If you would like to learn more about our processes and how we engage our clients, please get in touch with us.