Case studies

If we are able to automate security and testing tooling, we can incorporate it at every stage of the agile cycle, and improve outcomes for security, test and the development teams.

talk to an expert

When it comes to quality and security, people are your strongest asset—ours too. All of the outsourced team’s attention and effort are focused on the specific activities for which they were hired. This hyper-focus on specific stages in the quality assurance or security process leads to a more deliberately built pipeline which in turn increases revenue. Expertise leads to confidence, which leads to the trust of prospects, which leads to sales.

If you need to improve internal development, QA and deployment processes, and also require your product to be reliable and secure by design, you should consider a partnership with Tenendo.

Our experience in testing and security processes established delivery teams with highly skilled staff and expertise in security provides a great value to our services.

Cloud Infrastructure Audit and Performance testing case

Cloud Infrastructure Audit and Performance testing case

The main goal of the Technical Audit from a customer request was to understand if the system is scalable or not and provide guidance for improvements.

Read More

Improve and optimize the testing process

Improve and optimize the testing process

Building Test Architecture and Test Strategy in CRM project

Read More

The New Way of Working

The New Way of Working

The new development and testing strategy implementation in the financial project

Read More

Testing Management

Testing Management

In a management assessment the emphasis is mainly on leadership qualities. In this assessment the focus was on issues like independence, delegating and communication.

Read More

Automated testing

Automated testing

The joint work of architects, developers, tester and managers made it possible to redesign the project in a short time (about 2 months), speed up the testing process several times and simplify the preparation of…

Read More

PCI DSS segmentation testing case

PCI DSS segmentation testing case

The team created several hardware connect-back appliances and used it in a PCI DSS segmentation testing.

Read More

Azure Active Directory compromise

Azure Active Directory compromise

The Azure penetration test helped the client identify and remediate multiple issues and misconfigurations, harden their infrastructure and calculate potential risks.

Read More

EDR product’s effectiveness evaluation

EDR product’s effectiveness evaluation

Evaluating EDR Product against Threat Actors: Uncovering Limitations and Collaboration for Enhanced Detection of Multiple Killchains.

Read More

Social engineering

Social engineering

During this social engineering engagement, it was possible to achieve persistent internal access, exfiltrate confidential and personal information, and compromise the internal segmented infrastructure.

Read More

Payment processing API penetration testing

Payment processing API penetration testing

Tenendo specialists discovered an unattended staging environment and leveraged its vulnerabilities for sensitive information disclosure. This information was later reused in an attack against the main application, that allowed us access to the payment API…

Read More

Client-Bank application compromise

Client-Bank application compromise

This case is a very good example why manual penetration tests are valuable – the team achieved compromise without administrator access to the application, not using any known exploits or discovering injection/deserialization/other RCE flaws.

Read More

Internal Adversary Simulation case study

Internal Adversary Simulation case study

Do you want to know how your organisation will fare against an internal attack? Look no further than Tenendo's Internal Adversary Simulation.

Read More

Internal Adversary Simulation Case

Internal Adversary Simulation Case

The adversary simulation activity helped the client identify and remediate multiple issues with the on-premise infrastructure and vulnerabilities, calculate potential risks, and improve the overall security posture. Each finding also included proposed solutions for applying…

Read More