We use cookies to enhance your experience of our website, save your preferences and provide us with information on how you use our website. For more information please read our Privacy Policy. By using our website without changing your browser settings you consent to our use of cookies.

End-to-end product security testing helps tech company drive innovation.

Certus Cybersecurity’s long-term engagement with a Fortune 100 technology company includes architecture risk analysis, source code review and penetration testing. 1 minute read

At a Glance: Certus Cybersecurity was engaged by one of the largest companies in the world by market capitalization to provide product security services to Client on a long-term basis.

Services Provided: Certus Cybersecurity was engaged to provide product security services in support of a leading technology company with global visibility.  Certus Cybersecurity's support includes software security testing, code review, and architectural risk analysis support services. This long term and wide ranging engagement includes penetration testing of various web application end points, Android devices and applications, IoT devices, Bluetooth Low Energy and other security testing services. Certus Cybersecurity performs security code reviews for code mostly written in Java and C along other languages and assists with architecture design reviews and threat modeling.

Results:
• Identification of mulitple critical and high severity vulnerabilities impacting client assets. Our penetration testing findings included identification of an issue in the backend APIs that handle
certificates used to encrypt payment. 
• Identification through penetration testing of numerous high and medium severity vulnerabilities in the MQTT workflow that subscribe various payment related topics. 
• Effectively mitigated a mutual TLS certificate issue through partnership with the Client’s development
team.
• Leveraged architectural risk analysis, to identify architectural flaws in the way file-based encryption was implemented on a proprietary device.

Other Services
Software Security
Software Security
We provide software security services, including penetration testing, secure code review, and threat modeling.
Read more
Cloud Security
Cloud Security
We help organizations improve their cloud security posture and align to security best practice by identifying weak or missing security controls and misconfigurations.
Read more
Hardware Security
Hardware Security
We secure hardware technologies through services such as threat modeling, secure code review, and penetration testing.
Read more
Cryptography
Cryptography
We have specialized expertise to uncover cryptographic vulnerabilities and maintain the confidentiality, integrity, and authenticity of sensitive information.
Read more
Litigation Consulting
Litigation Consulting
We provide attorneys with highly effective consulting and expert testimony in litigation matters involving cybersecurity. Our consultants use their technical expertise and communication skills to bring clarity to complex cybersecurity issues.
Read more
Selected Case Studies
Penetration testing helps Fortune 100 technology company enhance product security
Hardware Security Penetration testing helps Fortune 100 technology company enhance product security
 
Application security testing boosts leading retailer’s security maturity
Software Security Application security testing boosts leading retailer’s security maturity
Contact Us
Ready to get started? Book a free consultation today, and we’ll write you back within 24 hours. For further inquiries, please submit the form at right. By submitting completed “Book a Free Consultation” form, your personal data will be processed by Certus Cybersecurity. Please read our Privacy Notice for more information.