Ref. Code: | EM-1 |
---|---|
Objective | To prepare the framework for securing Mobile Devices, Applications and Sensitive Data that is stored on Mobile Devices |
What we do | Phase 1
Phase 2
Phase 3
|
Requirements |
|
What you get | Security Assessment Reports:
|
Suggested frequency |
|
Ref. Code: | EM-2 |
---|---|
Objective | To identify the security issues related to storage and transmission of sensitive data and flaws in business logic of Mobile Applications |
What we do |
|
Requirements |
|
What you get | Security Assessment Reports:
|
Suggested frequency |
|
Ref. Code: | EM-3 |
---|---|
Objective | To identify syntax errors, configuration issues and flaws in the business logic that occurs in the application codes, which may result in a compromised application. |
What we do |
|
Requirements |
|
What you get | Security Assessment Reports:
|
Suggested frequency |
|