Brielmayer Consulting

consulting. security. development.

Arrow Down
Consulting Services

Security Training

One of the biggest weaknesses of any security system is the people involved in it.

Humans make mistakes: they respond to phishing emails, they click on links that they shouldn’t, they write down passwords, they download viruses and so on.

All of these actions can seriously compromise even the strongest security system and put your business at risk of suffering costly damage from a cyber attack.

The main focus our security training is to bring about effective behavioral change:
- establish a baseline so improvement can be measured
- understand the audience so that training materials are customised
- identify high-risk and desired behaviors
- identify solutions to facilitate behavioral change

Cyber Security Training

Data Protection Training

Social Engineering Training

Internet Research
Penetration Tests
Security Consulting Services

Penetration Test

Our penetration tests provide a reliable assessment of the security status while considering all the factors, which could influence security: applications, systems, networks and users. In order to analyze these decisive factors in detail, we offer a selection of tests. The result is an individual penetration test, which takes full account of the specific threats posed. Whether your infrastructure is protected against external or internal attacks will come to light in a penetration test conducted by our security experts.

Internal Penetration Tests

External Penetration Tests

Cyber Threat Assessment

Cyber Attack Simulation

Security Consulting Services

Vulnerability Research

Vulnerability Research service is an attack simulation to expose critical vulnerabilities of an application. This service is completely based on manual and technical audits. We perform vulnerability research service for client-based, server-based and web-based applications.

The detailed vulnerability research service will cover the following top critical vulnerabilities: Buffer Overflow, Input Validation, Dangling Pointers, Remote Code Execution, SQL Injection, Authentication Bypass and Code Injection

The result of testing includes details on application security issues, exploitation results, technical and strategic recommendations.

OWASP Top 10

SANS Top 25

Mitre CWE

Source Code Review
Penetration Tests
Security Consulting Services

Malware Analysis

To determine the purpose and methods used by specific malware, our customers may request Malware Analysis service. Upon receiving a sample of the malware, we will analyze the malware using proprietary and public toolsets. Within two business day, we will provide a customized report detailing the composition of the malware and address client information needs.

The detailed analysis report will help to determine following aspects:
- Malware activation, startup and infection mechanisms
- Local and network activities performed by the malware
- Malware’s remote control management mechanism used by attackers
- The domains, servers and e-mail addresses used for communication with attacker

Dynamic Analysis

Static Analysis

Memory Analysis

Packet Analysis

Security Consulting Services

Source Code Review

With our Source Code Review Service, we will carefully review your software and identify security vulnerabilities as well as violations of best practices, security design issues and much more.

This service can be administered on-site, remotely or a combination of both.

First, we'll gain a thorough understanding of your software design, including its purpose, background, framework and environment. Then we’ll extensively analyze your software. If vulnerabilities are found, we will evaluate them for business impact, prioritize them and recommend mitigation actions.

Our Source Code Review is able to find vulnerabilities that go unnoticed during traditional application testing because our Source Code Review process is much more exhaustive and goes deeper into the design of the software.

Dynamic Application Security Testing

Static Application Security Testing

Interactive Application Security Testing

Source Code Review
Website Design and Development
Development Services

Software Development

Through countless projects, we have been able to acquire a profound knowledge of existing technologies and are constantly building our expertise further. You profit from our know-how not only during the development of new software, but also during the maintenance and further development of existing software.

Our expertise mainly lies in C#, VB.NET, Java, Bash, KornShell, PHP, Python, JavaScript and Databases like MySQL and SQL Server.

Web Application

Desktop Application

SOA

Development Services

Web Applications

Web applications have exploded in popularity over the last decade given that ubiquity of web browsers, cross operating system compatibility and maintenance-free approach for end users.

Whether your application is a small internal system that helps your team work more efficiently or a multi-million user consumer app, our team can help starting with the strategy all the way through delivery and maintenance.

Device independent

Efficient

People-focused

Maintainable

Custom Web Applications
Enterprise Mobile Apps
Development Services

Enterprise Mobile Apps

Native apps? Check. Hybrid mobile apps? We do those. Not yet sure what type of app is best for you? No problem. We’re also experts in mobile strategy and design. Whether iOS, Android or HTML5 fits the bill, our team of web and mobile development experts can help you determine which technologies best suit your needs.

iOS

Android

Windows

HTML5 / Hybrid

Trusted by companies worldwide

We're humbled to work with some of the world's most recognized brands
and many others which are well on their way.

  • Logo Credit Suisse
  • Logo Raiffeisen
  • Logo UBS
  • Logo AXA Winterthur
  • Logo Zurich Versicherung
  • Logo Bison IT Services
  • Logo IASIU

Interested in work with us?

Please fill out the following form and we will get back to you shortly.

E-mail was successfully sent...
reCAPTCHA not solved...