English
  • Russian
  • Korean
  • Support
Positive Technologies
English
  • Russian
  • Korean
  • Solutions
    ICS/SCADA

    Critical infrastructure on the frontline

    Protection from targeted attacks (anti-apt)

    Early detection, rapid investigation

    Security Compliance

    Turn policies into protection

    Vulnerability Management

    Stop being an easy target

    Utilities

    Industrial-grade cybersecurity

    Financial Services

    Can your security keep up with you?

    ERP Security

    Take control of your ERP security

    View all →
  • Products
    MaxPatrol

    Vulnerability and compliance management system.

    PT Application Inspector

    Source code analysis tool.

    PT Sandbox

    Advanced sandbox with customizable virtual environments

    PT MultiScanner

    Multilayered protection against malware attacks.

    MaxPatrol SIEM

    Knows your infrastructure, delivers pinpoint detection.

    PT ISIM

    Cyberthreat detection and incident response in ICS.

    XSpider

    Vulnerability scanner.

    PT Application Firewall

    Intelligent protection of business applications.

    PT Network Attack Discovery

    NDR system to detect attacks on the perimeter and inside the network.

    MaxPatrol SIEM All-in-One

    Full-featured SIEM for mid-sized IT infrastructures

    View all →
  • Services
    ICS/SCADA Security Assessment

    Full Range of ICS-specific Security Services

    Mobile Application Security Services

    Security Analysis and Compliance Audit

    Penetration Testing

    A Comprehensive Approach

    ATM Security Assessments

    Uncover Your Weaknesses

    Custom Application Security Services

    Independent Expert Analysis of Your Source Code

    Forensic Investigation Services

    Prevent Future Incidents

    Web Application Security Services

    Black Box and White Box Analysis

    SSDL Implementation

    Secure Application Development at Your Organization

    Advanced Border Control

    Upgrade Your View of Perimeter Security

    View all →
  • Analytics
    Threatscape
    PT ESC Threat Intelligence
    Cybersecurity glossary
    Knowledge base
    Research Blog
    View all →
  • Partners
    Authorized Partners
    Distributors
    Technology Partners
    View all →
  • About
    Clients
    Press
    News
    Events
    Contacts
    Documents and Materials
    View all →
Menu
  • Home
  • Services
  • Custom Application Security Services

Custom Application Security Services

Independent Expert Analysis of Your Source Code

About Service

Whether your company develops custom applications in-house or orders them from a vendor, most development teams focus on functionality, with security issues receiving only secondary attention. As a result, custom applications are often highly vulnerable to attacks.

Custom applications frequently automate critical business processes and work with confidential information that must be protected. When security mechanisms are missing, employed incorrectly, or even contain special backdoors left by developers that can be exploited by hackers to gain unauthorized access, the risks to your company can be enormous.

Custom application security tests by Positive Technologies provide your company with independent expert analysis of your source code that measures the risk in relation to known methods of attack. We are unique in our ability to work with huge amounts of source code (tens of megabytes), our deep knowledge of code generated using different technologies, and our highly qualified experts with over a decade of experience conducting custom code analysis for large enterprises around the world.

Our process emphasizes intensive manual testing with additional automated checks to enhance the overall quality of analysis. Our typical testing procedure is as follows:

  • Estimate the volume of work (size of the source code used, programming languages used, technology development)
  • Analyze source code manually (our experts work on-site at your facility)
  • Analyze source code with automated methods
  • Identify vulnerable sections of your code
  • Evaluate results
  • Provide recommendations for eliminating source code vulnerabilities

Results

The key deliverable from our testing includes a report detailing:

  • Test methodology
  • General conclusions about the quality of the source code and its resistance to known attack methods
  • Explanations for all identified vulnerabilities and an analysis of the potential impact on your business if these vulnerabilities were exploited
  • Recommendations for source code revisions to mitigate each vulnerability (including code examples)

Contact us

By clicking Send you give your free and explicit consent to process your personal data and agree to our Privacy Policy

Company Services

  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • SSDL Implementation
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control

Company Products

  • PT Sandbox
  • MaxPatrol SIEM All-in-One
  • XSpider
  • PT Network Attack Discovery
  • MaxPatrol SIEM
  • MaxPatrol
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT MultiScanner
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • SSDL Implementation
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
  • Research Blog
Partners
  • Authorized Partners
  • Distributors
  • Technology Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002-2021 Positive Technologies
Find us:
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002-2021 Positive Technologies
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap