Case studies

If we are able to automate security and testing tooling, we can incorporate it at every stage of the agile cycle, and improve outcomes for security, test and the development teams.

talk to an expert

When it comes to quality and security, people are your strongest asset—ours too. All of the outsourced team’s attention and effort is focused on the specific activities for which they were hired. This hyper-focus on specific stages in the quality assurance or security process leads to a more deliberately built pipeline which in turn increases revenue. Expertise leads to confidence, which leads to the trust of prospects, which leads to sales.

Case study: Improve and optimize the testing process

Case study: Improve and optimize the testing process

Building Test Architecture and Test Strategy in CRM project

Read More
Case study: The New Way of Working

Case study: The New Way of Working

The new development and testing strategy implementation in the financial project

Read More
Case study: Testing Management

Case study: Testing Management

In a management assessment the emphasis is mainly on leadership qualities. In this assessment the focus was on issues like independence, delegating and communication.

Read More
Case study: Automated testing

Case study: Automated testing

The most important factor that necessitates test automation is the short development cycle. Agile teams have only a few weeks to get a grasp of the requirement, make the code changes, and test the changes.…

Read More
Case study: Payment processing API penetration testing

Case study: Payment processing API penetration testing

Our penetration testing team just finished an external penetration test for *an undisclosed* payment processing company. The test included both black box testing without a predefined scope or any additional information about the company and…

Read More
Case study: Web application compromise

Case study: Web application compromise

This case is a very good example why manual penetration tests are valuable – the team achieved compromise without administrator access to the application, not using any known exploits or discovering injection/deserialization/other RCE flaws. The…

Read More
Case study: Internal adversary simulation

Case study: Internal adversary simulation

The adversary simulation activity allowed the security team to demonstrate a complete compromise path while not using any usual, “exploitable” vulnerabilities. Instead, the attackers relied on human factor, weak password policies and password reuse, service…

Read More