YOUR WARRANTY

At Nordic Resilience it is our vision to always uphold a high quality in all of our services, which is also why you won’t find an excessively long list of services we offer.
Like a good restaurant, we like to stick with 10 excellent products instead of 100 mediocre.

This also enables us to provide you with a guarantee; if by the end of our services, you’re not satisfied with the quality, we will refund you all your money back.

We invite you to take a look at our services below. We are confident you will find inspiration to strengthen your overall cyber security among our services.
Please be reminded that Nordic Resilience have various partners that cover other services.

SERVICES
5

Penetration test of web application

A web application penetration test focuses on evaluating the security of a web application. The process involves an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities.

Read More

2

Penetration test of external infrastructure

An external infrastructure penetration test is a practice that assesses the externally facing assets for an organization. During an external penetration test, the assessor attempts to gain entry into the internal network by leveraging vulnerabilities discovered on the external assets.

read more

8

BROAD ASSESSMENT OF CYBER SECURITY

A holistic approach to an organization’s current cyber security maturity. This service aims to provide a broad analysis of an organization as a whole and catch risks associated with its people, processes and technology.

read more

1

Penetration test of web service

A web service penetration test focuses on evaluating the security of a web application. The process involves an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities.

read more

4

PENETRATION TEST OF MOBILE APPLICATION

A mobile application penetration testing focuses on client-side security, file system, hardware and network security surrounding the mobile application (iOS and/or Android).

read more

7

Configuration review of Active Directory

A review of Active Directory (AD) provides the organization with an idea of its AD security level. It identifies weak configurations and trust issues that unnecessarily broadens the attack surface for an attacker.

read more

3

Penetration test of internal infrastructure

An internal infrastructure penetration test focuses on assessing an organization’s internally accessibly IT infrastructure. This is usually done by combining advanced automated tools with manual creative tests across a large number of hosts.

read more

9

Reverse engineering of application

The practice of reverse engineering an application aims to review it for weaknesses that can be used to create exploits. Such exploits could in turn be abused to compromise the confidentiality, integrity and/or availability of the application and underlying system.

read more

6

GOT SOMETHING ELSE ON YOUR MIND?

Contact us! We are always happy to listen to your requirements and discuss whether we can be of assistance.

QUOTES

The price of an engagement depends on the hours required to complete it, which again depends on the complexity of the engagement. After understanding your requirements, we will be able to provide you with a noncommittal offer. We are confident that you will find the quality of our services to be excellent and our prices to be very reasonable.

We remind you that at Nordic Resilience we are happy to discuss any of your cyber security related needs free of charge.

price