Personal tools
Interhack Cybersecurity Application Security Evaluation

Application Security Evaluation

How well will your application withstand attack?

Application Security Evaluation finds weaknesses in the design and implementation of software. Whether building your system completely from scratch, deploying open source systems, or building systems from other components, Interhack's Application Security Evaluation will show you where there are weaknesses and help you deploy your system safely.

In our engagement we build an understanding of the application's intent and requirements by assessing code, reading documentation, and talking with staff. Our approach addresses eleven critical points, namely,

  1. Information gathering,
  2. Configuration and deployment management,
  3. Identity management,
  4. Authentication,
  5. Authorization,
  6. Session management,
  7. Data validation,
  8. Error handling,
  9. Use of cryptography,
  10. Business logic, and
  11. Client interface.

Using application security standards including OWASP, NIST SP 800-66, and other standards relevant to your industry, we show how your application supports or does not provide support for operation within a security-aware organization. Our recommendations provide you the guidance to help you achieve your objectives while properly defending against inevitable attack.

Started originally as a research group in privacy and security, Interhack has been performing software evaluation since its earliest days in 1997. Our work in the area has been featured in the international media, used to strengthen systems for clients, and used in courts throughout North America.

Please contact us to discuss your concerns and find out how Interhack can help.

Document Actions