Our experience in testing and security processes, established delivery teams with highly skilled staff and expertise in security provide a great value to our customers.talk to an expert
Predefined engagement steps
Fill out the questionnaire
In order to provide you with an accurate time and effort estimation we would kindly ask you to fill out one of the provided questionnaires:
Security services questionnaire (this questionnaire will let you choose specific services you might need)
Application penetration testing questionnaire (choose this questionnaire if you just need an application penetration testing)
Technical audit questionnaire (choose this questionnaire if you need a technical assessment of your cloud infrastructure)
Sign an NDA
To avoid any information leakage or disclosing our customers’ names, we only share anonymized reports examples to companies with signed an NDA. You will receive it just after completing the questionnaire.
Book a technical session
During the technical session, we will analyze your requirements, discuss similar cases from our practice, discuss the project preparation and communication channels, and agree the deliverables.
Get a commercial offer
We will send you a detailed proposal. This proposal is also a contract between our companies. If you need penetration testing, a free post-remediation retest is always included.
Start a project
A few days before the start of the project, we check that all the necessary access credentials and materials have been received. We sign with the customer an authorization form to perform penetration tests. An authorization form contains contact details of technical specialists from both sides and a work schedule.
Project results presentation
At the end of the project, an expert from Tenedo makes a presentation of the work performed and the vulnerabilities or infrastructure deficiencies found. We send all reports and other artefacts stipulated by the contract before the presentation.