Facing a challenge or a problem?

( Allow our Industry Experts to revert in complete confidentiality )

Created jtemplate joomla templates



Application Vulnerability Assessment

Hackers, Cyber criminals and unethical elements are stalking the Internet. It is CRITICAL and IMPORTANT that applications designed are SAFE to HOST and that users (customer) may make use of the web service without fear or risk.

Protection is required from Threat Agents who could be an individual or group that can manifest a threat.  They can be classified as follows:

  • Non-Target Specific: Computer viruses, worms, trojans and logic bombs.
  • Employees: Staff, contractors, operational/maintenance personnel, or security guards who are annoyed with the company.
  • Organized Crime and Criminals: Criminals target information that is of value to them, such as bank accounts, personal information, credit cards or intellectual property that can be converted into money. Criminals will often make use of insiders to help them.
  • Corporations: Corporations are engaged in offensive information warfare or competitive intelligence. Partners and competitors come under this category.
  • Human, Unintentional: Accidents, carelessness.
  • Human, Intentional: Insider, outsider.

The threat agents exploit the Vulnerabilities which could be hole or a weakness in the application, a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application.

Stakeholders include the application owner, application users, and other entities that rely on the application.

Vulnerability Assessment based on OWASP (2007 and 2010) Top 10 is required to be carried out to ensure adequacy of

  • Authentication
  • Authorization
  • Session Management
  • Input Validation
  • Error Handling
  • Logging
  • Cryptography


We issue Security Certificate to the respective URL which states "Safe To Host".

Banking, Government, Insurance, Equity Trading, Commodity Trading, IT / ITES, BPO, Cement, Health, NGO, UN, Media