New: Compass-Training "Internal Network and System Security" in Bern
In the 2-day seminar (in German) from February 11/12, 2020, you will get to know the most important basic concepts of IT security, attack tools and... Read more
Werkstrasse 20
8645 Jona
Schweiz
In a security review, we focus on the conceptual aspects of a system, component, configuration or code. The experience of our security analysts allows us to identify critical security aspects and provide expertise for proper implementation. This offers you a security foundation or a second opinion on which you can build further - even before the go-live.
When developing concepts, all business requirements must be met simultaneously, often at the cost of security. We analyze your concepts, identify potential vulnerabilities and provide recommendations to improve security and implement best practices.
Firewalls are among the most important and critical network components. In a firewall review, we assess whether your firewall configuration fits your general zone concept, whether they support the segregation of your networks effectively and whether your rules are correctly implemented to protect your systems following the least privilege principle.
A single forgotten character or a single statement in the wrong place can make the difference whether your code is secure or not. While we do not offer full automated source code scanning, our analysts can assess critical components or specific security-relevant functions manually and in-depth. This allows us to challenge the code for logical flaws, which an automated tool cannot perform.
Cloud infrastructure (such as Microsoft Azure, Amazon Web Services and Google Cloud Platform), proxies, web application firewalls, spam filters and any other security component can be configured in various ways. The services are very complex to configure and thus, they may end up with default or insecure settings. In order to gain the assurance that services are secure and equipped with the industries' best practices, we review your configurations and provide suggestions for improvement.
Every single client and server in your network can be a target for hackers. We verify your Windows or Linux builds for vulnerabilities and best practices so that you get a solid and secure base image.
Hardening checks usually cover:
We are glad to give you further information: Your contact person
In the 2-day seminar (in German) from February 11/12, 2020, you will get to know the most important basic concepts of IT security, attack tools and... Read more
The association «KMU Swiss» promotes the interaction between companies and specialists. He organises the annual KMU Swiss Forum. The next years motto... Read more
Heise Medien lädt zur nächsten Veranstaltung der IT Security Branche ein. Im März 2020 öffnen die Tore der secIT zum dritten Mal. Wir sind vor Ort mit... Read more
Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more
Fabio Poloni identified an XSS vulnerability in totemodata®. Read more
«Heime & Spitäler» ist das Fachmedium für Entscheidungsträger von Schweizer Heimen und Spitäler. In der aktuellen Ausgabe beschreibt Compass Security... Read more
As a defender, you want to find and patch attack paths in your Active Directory environment. One cannot easily spot issues by looking at the Active Directory Users and Computers console, GPOs, etc.... mehr
Ransomware focuses on encrypting data on a filesystem-level, either locally on infected client systems or remotely on accessible file servers. However, what if ransomware would start encrypting data... mehr