Skip to main content

Compass Security: Cyber Security and Cyber Defense Services

Penetration Tests

In the role of the hacker, we test devices, networks, services and applications as well as the behavior of employees. We uncover vulnerabilities and provide you with recommendations on how to fix them. » read more

Security Reviews

Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution. » read more

Red Teaming

We go after your critical assets like an adversary would do and aim to fulfil pre-defined missions. It is the goal of red teaming to measure and improve your organization's detection and response capabilities. » read more

Bug Bounty

We connect you with researchers from around the world who continuously and comprehensively assess the security of your applications for vulnerability - For effective and efficient security testing according to your own rules. » read more

Managed Detection and Response

With our MDR service, you get the complete package: real-time monitoring, threat detection, and effective incident management. » read more

Digital Forensics and Incident Response

Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents. » read more

FileBox

FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents. » read more

Hacking-Lab

Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. » read more

Trainings

Benefit from our analysts' knowledge of penetration testing, network analysis, digital forensics, secure mobile apps, and other applications, or choose to receive training in our specially created lab. » read more

Calendar

Black Alps - Two days of learnings, networking, and fun!

Read more

In this OSINT training course, you will learn techniques and tools for collecting, analyzing and interpreting digital information for your research.

Read more

With over 400 attendees, the Studerus Technology Forum (TEFO) has become a renowned event in the ICT industry. The aim is to provide CIOs and IT…

Read more

News

Together with Compass Co founder Ivan Bütler, Viseca Card Services SA is putting the spotlight on phishing. In this type of attack, criminals try to…

Read more

WISO - ZDF's consumer magazine - recently reported on cases of credit card fraud in hotel bookings. Compass Security explains how such fraud could…

Read more

How do social engineering attacks work? In «Beobachter», the Swiss magazine for law and justice, Ivano Somaini talks about his unusual everyday life…

Read more

Blog

During Business Email Comproise (BEC) engagements we often have to analyze the provenance of emails. According to the FBI's Internet Crime Report, BEC…

Read more

Given the explosion of development and interest in deep learning models in the past year, we decided to research on the topic to increase our know-how…

Read more