We perform current state maturity assessments covering all creation and production process activities constituting an information system’s lifecycle. As cyber security and software engineering professionals, we work closely with the customer’s development teams with the aim of ensuring the correct operation of the target system, data integrity, availability and confidentiality. A correctly behaving information system is never a certain outcome of any development process, but requires continuous, systematic and hard work in design, development, deployment and maintenance phases.
Typical forms of collaboration are architecture workshops, software process maturity assessments, software security testing (hacker testing, penetration testing), modeling and documenting the target system’s security mechanisms. Based on the results of the security verification activities, a public summary statement and CyberSafe certification may be granted to support the customer’s external stakeholder communication activities.
In our blog series, we write about cybersecurity domain in general, our service and product offerings as well as show case some of our customer cases. The blog posts are categorized by service types.Read software security related articles
Kari Halavaara, t. +358 50 553 4796