Security audit

Protection of personal data, passwords and payments

Page head background

Protection of personal data, user passwords, payment information and other data is the responsibility of the business.

This procedure should be conducted on a regular basis until there is a problem. But if there is any trouble, it is definitely not possible to postpone.

A danger of hacking

  • Hackers can access your data such as documents, source codes, databases;
  • Users' personal data, logins, passwords, bank card numbers may be in danger;
  • A temporary or permanent shutdown of the website, which leads to loss and causes users' dissatisfaction;
  • Information or code substitution on the website - from third party announcements to substitution of information about a payment gateway;
  • Complete website and data deletion beyond recovery.

How is the audit carried out?

We conduct the authorized attack on your website with the same tools that the hackers use in their work.

A white box method

We analyze the source code of your website and look for vulnerabilities based on our experience of web development.

A black box method

We act like hackers do and try to hack your website in every possible way, without access to the source codes.

Audit result

After the work has been done, you receive a full report on the vulnerabilities found, their level of danger and ways to eliminate them. You can address identified vulnerabilities on your own or entrust it to us.

Where to start?

We analyze the website, use scenarios, draw up a work plan and determine the cost of work.

Order the audit

Prices and timing

We have identified an approximate price range for your comfort. However, the important thing to remember is that the price of each solution is culculated on the individual basis.

Level
Black box
Most customers choose this method
White box
Testing with source code analysis
Price
800 $
The cost may vary depending on the complexity of the system being tested
from 2000 $
The cost is determined after preliminary system analysis
Vulnerability scanning
Recommendations for addressing
Source code analysis
Addressing vulnerabilities On the individual basis On the individual basis
Development time 1-2 weeks from 3 weeks
Order
Order
Telegram
Facebook Messenger

Callback

An error occurred while sending the request. Please try again

Your request was sent

We will contact you any time soon to discuss details of your project