In a security assessment we check a given application for flaws and use the results to prepare a risk profile. This profile will ensure that the security requirements identified in application design have been implemented correctly. For the assessment, we recommend a gray box method which guarantees an optimally efficient audit with the necessary depth with regard to the trouble spots. Upon request, we can establish compliance with the most common security standards (ISO 27002, OWASP, ASVS) or adherence to the Federal Act on Data Protection (DPA). Our security advisors and our experienced software developers, in addition to showing our customers where there are security deficiencies, convey know-how and best practices within any given development environment.