SERVICES
Security Assessment
Our team assess the vulnerability of infrastructure and manage risks for organizations
Infrastructure Security Testing
Our infrastructure security testing includes vulnerability assessment and penetration testing from attackers perspective helps organizations gauge security controls. This assessment helps organization’s gauge whether the security controls in place are sufficient to protect your organization, specific systems and sensitive information from internal and external threats.
- Internal Penetration Testing: It is conducted on the internal network to identify vulnerabilities that are visible to employees, contractors and partners who have access to the organization’s network.
- External Penetration Testing: It is conducted on public facing network to identify vulnerabilities that are visible to outsiders at large.
Web Application Security Testing
Tabono’s two-pronged approach to testing with specialized automated testers and manual testers who perform exhaustive manual testing. We can help improve your application quality, scale testing capabilities, reduce release cycles and contain costs. Our testing engineers provide consulting for automation engineering, solutions and validation.
Our application testers are experienced and trained in OWASP, SANS, MITRE principles and can guide your team understand the complete threat landscape in which your company’s applications work.
Our automation testing can keep your application protected the following attacks:
- Injection attacks
- Cross Scripting attacks
- Cross Site Request Forgery
- DoS
- Request/ Response Smuggling attacks
Mobile Application Security Testing
Our mobile application testing is built on deep understanding of the mobile operating system, your applications source code, network security, data storage, cryptography, inter-app communication and many more ingredients.
We focus on many key areas of the mobile application security including:
- Local data storage
- Communication with trusted endpoints
- Authentication and Authorization
- Interaction with the mobile platform
- Code Quality and Exploit Mitigation
- Anti-Tampering and Anti-reversing
Our consultants can select the best testing tools suitable for your application from either an on-premise collection of testing tools or cloud-based collection of tools. Alathea can help you create a comprehensive test strategy covering the entire spectrum of target devices, functional testing tools, encryption etc. We can onboard tools, automate the entire testing, scale the testing infrastructure and work with you in an iterative and incremental way.
Security Architecture Review
Goal of Tabono’s security architecture review services is to define and create a uniform and consistent set of security processes, information security management systems and technology architecture in alignment with organization’s goals and strategic direction.
Tabono consultants will work with your business and technology team to identify current and future business needs to develop a coherent, cohesive, scalable and flexible security architecture.