For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser.

Close

Not a member yet? Register now and get started.

lock and key

Sign in to your account.

Account Login

Web Application

Advances in web technologies coupled with a changing business environment, mean that web applications are becoming more prevalent in corporate, public and Government services today. Although web applications can provide convenience and efficiency, there are also a number of new security threats, which could potentially pose significant risks to an organization’s information technology infrastructure if not handled properly. Vulnerabilities made by developers or configuration mistakes are inevitable and are being found every day and exploited or exposed.

If web application security is not taken care of, meaning that web application vulnerability is allowed to happen, then not only your entire database of sensitive information is at serious risk, but your website can become the launch site of criminal activities such as hosting phishing sites or used to transfer illegal content.

Custodis-IT service provides a thorough identification of all vulnerabilities, their actual risk level and detailed recommendations to remediate them.

Common Web application vulnerabilities are:
1. SQL Injection
2. Cross-Site Scripting (XSS)
3. Authentication Bypass
4. Application Logic Flaws
5. Local file inclusions
6. Code Execution

We use automated vulnerability web scanners but our methodology is built around a manual testing process that identifies all types of vulnerabilities and logical flaws that are not typically detected during automated web application scanning. Due to the fact that many applications are custom-build. Our methodology goes well beyond looking for the OWASP Top Ten issues.

If you would like more information CONTACT US today or call +31 (0)365 389 322.