Home . Our Services . Application Security & Assessment

Application Security & Assessment

    Enquire now


    At Adactin, we offer managed security services, which can be either remote, onsite or a combination of the two. The level of the service can begin with something as simple as periodic log analysis, going right up to the use of Security Information Management (SIM) solutions to monitor your systems 24/7. We support an extensive list of security devices and systems and offer options ranging from open-source to enterprise solutions such as RSA Security Analytics and HP Arcsight. Our trained and experience engineers can get your security operations centre up and running in a matter of weeks!

    Our security monitoring experts possess GCIA and GCFA certifications, providing the capability to analyse incidents, deal with false positives, and respond appropriately to critical events.

    Network Monitoring

    As part of Network Monitoring, we will help you

    • Identify your critical information assets
    • Measure your current network security effectiveness
    • Implement Managed Security Monitoring
    • Commence 24×7 Real-time Information Security Monitoring of your network
    • Secure your network with real-time countermeasures

    Incident Response

    • Perform incident classification
    • Incident triage
    • Inform your relevant teams with actionable intelligence
    • Work with your IT teams to contain the incident, respond to it and prevent recurrence of similar breaches in the future

    Anti-Phishing and Malware Monitoring

    • 24×7 monitoring and detection of phishing and pharming attacks through
      • Proactive detection mechanism which monitors Domain registrations, ISP’s email accounts,
      • Reverse Whois Database, global forums, industry phish reports, DNS Poisoning
      • Abuse-mail box Monitoring Service (customer-to-vendor feed)
      • Web Logs Monitoring Service (customer-to-vendor feed)
    • Prevent & respond to phishing and pharming attacks by
      • Shutdown of identified phishing websites
      • Shutdown of identified phishing email accounts
      • Shutdown of identified pharming attacks
      • Counter-measures service to feed dummy data to fraudster
      • Feeding phishing site URL to anti-spam / anti-virus vendors, leading browser vendors, & URL filtering vendors
      • Fraudster Tracking – Phish tagging, Automated submission of tracking credentials
      • 24×7 brand abuse monitoring

    On-demand or Scheduled Vulnerability Scanning

    Our custom-built vulnerability management portal allows you to select your assets, select the frequency and intensity of scanning and ensure that your public-facing IP addresses are being monitored on a regular basis for any vulnerabilities. Moreover, our portal allows you to track issues, update when they have been fixed, or mark certain issues as false positives.

    Security Device Management

    We have engineers trained and qualified on a wide variety of security solutions from Cisco, Fortinet, Checkpoint, Palo Alto, Tipping Point, IBM Proventia, Juniper, etc.

    • Configuration/reconfiguration Management, Version upgrade/updates, secure configuration and patch management of the assets in scope including Firmware, OS, and Software’s installed on the assets.
    • Day to day administration of the assets in scope including Firmware, OS, and Software’s installed on the assets.
    • Follow change management process.
    • System and configuration backup management
    • Firewall and IDS / IPS Signature Updates.
    • Changes to system alerts, monitoring, and logging functions
    • Rule base Management – Firewall & IDS.
      • Risk Assessment of Desired Changes
      • Regular Firewall rule-base Addition, Deletion, Modification to allow/disable network access
      • Regular IDS/IPS rule-base changes to mitigate vulnerabilities
      • Rule-base changes to mitigate reported security incidents by SIEM tool
      • Document & configuration of rule base
      • Fraudster Tracking – Phish tagging, Automated submission of tracking credentials
    • Periodic review of policies and recommendations to ensure best possible security posture & efficiency

    Security Operations Centre

    Design and implement a security operation centre for network and security management, including physical layout, technology deployment, manpower resourcing and training.

    Security Implementation

    Designing a secure network architecture, by determining threats, isolating secure and insecure elements, and deploying network segregation and attack monitoring solutions. Implement essential security controls such as proper Active Directory design, Anti-virus deployment, VLAN configuration, and hardening of servers and network components.

    System Hardening

    Systems hardening is a process of identifying all the assets that are critical to the company, evaluating the present security configuration of the asset, understanding the applications depending on the infrastructure and their constraints, as well as constraints of the network architecture, and then deploying appropriate hardening guidelines for all the critical resources.

    Product Provisioning

    Determine the right security technologies to be deployed, and aid procurement and deployment of these. Our expertise includes firewalls, intrusion prevention systems, UTMs, SSL VPNs, anti-virus, and security assessment software.

    Penetration Testing, Vulnerability Assessment

    We are one of the well-established penetration testing companies, who have been consistently delivering quality projects for clients across the globe. Some of our customers include industry leaders across banking, financial services and various government entities. We specialise in the whole spectrum of penetration testing capabilities – right from information gathering, foot-printing, vulnerability assessment, exploitation, and reporting. Our penetration testing practices encompass web applications, client-server applications, infrastructure, SCADA, ERP systems, mobile applications, wireless, social engineering and a whole host of technologies and platforms.

    Our Approach

    Penetration Testing constitutes that part of a security assessment exercise which attempts to simulate the techniques adopted by an attacker in compromising the target systems. Our penetration testing methodology is well aligned with established standards and practices, combined with our extensive experience.

    Adactin is engaged in different types of penetration testing services.

    Web Application Security Testing

    In this type of penetration test, we assess the security of the application by focusing on remotely exploitable vulnerabilities, application architecture, design and implementation. We also assess the controls with respect to user access, privilege levels, development and delivery, and overall design of the applications. This helps to give the total threat profile of your web application environment.
     

    Network Penetration Testing

    This type of a penetration test involves identifying the targets through Google searches, WHOIS, DNS queries, etc. Fingerprinting and identifying vulnerabilities. The exploitation of these vulnerabilities depends on whether it is part of the engagement or not. Limited exploitation is always done in terms of password guessing, directory traversals, file uploads, etc. Before going for stronger exploitation methods such as Denial of Service attacks, Buffer Overflow exploits, etc., we take prior written consent from the management so as to not to cause possible fallouts from the such exploitation methods.

    Risk-based Penetration Testing

    The days and age of tool-based scanning is long over. The need of the hour is for the penetration testing team to understand the business risks associated with the application and build test cases accordingly. Be it an ERP system or a mobile application, our first step is to always understand the flow of the application, the business processes around the system, and the concomitant risks from it. Once the automated scanning parts are over, then our real expertise comes into play leveraging our database of test cases combined with our strong understanding of business processes across various industries.

    This approach, then might also include social engineering attacks, threat modelling, and other elements that might not be typical of a traditional penetration testing exercise.

    Benefits you get with Adactin

    Our penetration testing service is a highly creative, out-of-the-box engagement, and often results in new vulnerabilities being discovered or a new tool being developed from such an exercise. Our teams are highly passionate and committed to doing as comprehensive an assessment as possible. Our team members are also actively engaged in security research initiatives such as:

    • Security advisories of the vulnerabilities we have discovered
    • Penetration testing tools that we have developed
    • Our articles that have appeared in various publications and websites,
    • Presentations made at various security forums and conferences

    We pride ourselves in providing quality deliverables to our clients during our security assessment engagements with them. Our client testimonials are the strongest testimony for our work quality and deliverables.

    Application Security

     

    We are a leading application security company with a full range of services around application threat modelling, security assessments, secure code review, trainings on secure coding, and implementing an application security strategy for your organisation.

    Application Security Assessment

    Application Security Assessments are designed to identify and assess threats to the organisation through proprietary applications or those delivered by vendors with little or no customisation. Our application security assessment methodology is designed around the following well known security assessment guides such as:

    • OWASP Top 10 (Open Web Application Security Project)
    • Threat Modeling processes such as STRIDE and DREAD
    • OWASP’s Software Assurance Maturity Model (OpenSAMM)
    • Open Security Testing Methodology Manual (OSTMM)
    • Web Application Security Consortium (WASC) guidelines

    As your applications may provide interactive access to potentially sensitive materials, it is vital to ensure that these applications don’t expose the underlying servers and software to malicious attack(s) or allow any unauthorised user to access, modify or destroy data or stop critical system services.

    Our Approach to Application Security Assessments

    Adactin uses a number of application security testing techniques. This might include black-box testing, grey-box testing, fault injection, and behaviour monitoring. This is done along with business logic testing which might exploit or abuse an application’s functionality to carry out unwanted actions such as privilege escalation attacks, authorisation bypass, parameter manipulation, etc.

    Threat Modeling enables you to make effective application risk management decisions in the Software Development Life Cycle. It prioritises your business’s security requirements allowing you to understand and define security strategy from a defense perspective. We typically adopt the industry standard threat modeling approach by using STRIDE and DREAD models to evaluate your overall application security posture.

    As your applications may provide interactive access to potentially sensitive materials, it is vital to ensure that these applications don’t expose the underlying servers and software to malicious attack(s) or allow any unauthorised user to access, modify or destroy data or stop critical system services.

    Our Approach to Application Security Assessments

    Adactin uses a number of application security testing techniques. This might include black-box testing, grey-box testing, fault injection, and behaviour monitoring. This is done along with business logic testing which might exploit or abuse an application’s functionality to carry out unwanted actions such as privilege escalation attacks, authorisation bypass, parameter manipulation, etc.

    Threat Modeling enables you to make effective application risk management decisions in the Software Development Life Cycle. It prioritises your business’s security requirements allowing you to understand and define security strategy from a defense perspective. We typically adopt the industry standard threat modeling approach by using STRIDE and DREAD models to evaluate your overall application security posture.

    As your applications may provide interactive access to potentially sensitive materials, it is vital to ensure that these applications don’t expose the underlying servers and software to malicious attack(s) or allow any unauthorised user to access, modify or destroy data or stop critical system services.

    Our Approach to Application Security Assessments

    Adactin uses a number of application security testing techniques. This might include black-box testing, grey-box testing, fault injection, and behaviour monitoring. This is done along with business logic testing which might exploit or abuse an application’s functionality to carry out unwanted actions such as privilege escalation attacks, authorisation bypass, parameter manipulation, etc.

    Threat Modeling enables you to make effective application risk management decisions in the Software Development Life Cycle. It prioritises your business’s security requirements allowing you to understand and define security strategy from a defense perspective. We typically adopt the industry standard threat modeling approach by using STRIDE and DREAD models to evaluate your overall application security posture.

    As your applications may provide interactive access to potentially sensitive materials, it is vital to ensure that these applications don’t expose the underlying servers and software to malicious attack(s) or allow any unauthorised user to access, modify or destroy data or stop critical system services.

    Our Approach to Application Security Assessments

    Adactin uses a number of application security testing techniques. This might include black-box testing, grey-box testing, fault injection, and behaviour monitoring. This is done along with business logic testing which might exploit or abuse an application’s functionality to carry out unwanted actions such as privilege escalation attacks, authorisation bypass, parameter manipulation, etc.

    Threat Modeling enables you to make effective application risk management decisions in the Software Development Life Cycle. It prioritises your business’s security requirements allowing you to understand and define security strategy from a defense perspective. We typically adopt the industry standard threat modeling approach by using STRIDE and DREAD models to evaluate your overall application security posture.

    Development of Secure Code Development Guidelines

    Based on the globally accepted OWASP guidelines, we help clients by developing comprehensive secure coding guidelines, which not only address the programming language in use, but also the configuration of the platform being used to run the application. For instance, our PHP secure coding guidelines incorporate security configurations to be done on php.ini, .htaccess and httpd.conf files in order to ensure that vulnerability in these does not result in an application compromise.

    Benefits of Risk-Based Security Assessment

    During application security assessments, an important aspect often overlooked is the business logic testing which directly impacts the business operations. This needs to be tested by understanding the business process running on the system and then by building business logic test cases accordingly. Having worked with organisations across numerous industries, we have a fairly strong understanding of typical business process such as online trading, e-commerce, retail banking, treasury, payroll, procurement, etc. This helps us build in-depth business logic cases even in a routine penetration testing exercise and add far more value than a plain-vanilla penetration testing exercise.

    Further, our research shows that one-size-fits-all doesn’t work when it comes to application security strategy. Having worked with organisations of all shapes and sizes and at various levels of maturity when it comes to application security, we have realized that every organisation needs to adopt a customised approach for application security.