"During 2010, the average website had 230 vulnerabilities with High, Critical, or Urgent severity"WhiteHat Security 2011 Report
Compef offers confidential services for web application security. Among them, ethical hacking for finding security holes in your web application; infrastructure hardening for protecting systems; and web performance optimizations for speeding up web pages. Compef's main characteristics are integrity, trust, technical capabilities and communication skills.
Web Application Penetration Tests
Penetration tests will provide valuable feedback of your infrastructure security health. Reports are accompanied with graphic summaries and recommendations to tackle found issues. The two principal penetration tests services are described below:
White Box testing covers both internal and external security. The overall infrastructure health check is determined by source code reviews, plus manual and automated tests on the network perimeter and servers.
Development and Testing environments are evaluated as part of the internal security assessment. Sometimes the production environment is well protected from outsiders but not from accidents, disgruntled employees or business partners.
Black Box penetration tests evaluate web infrastructure security by simulating outsider attacks. These tests require no prior knowledge of the system as they resemble external attacks.
All the steps during the Black Box are transcribed and provided for both passed and failed tests. These tests can be arranged at non-standard work hours in order to prevent conflicts with production systems and networks.
Boost Web Performance
Speed up your web application
Performance Reverse Proxy
Accelerate web traffic. For example by setting up:
- load distribution,
- high-concurrency web servers implementations,
- SSL and static content offloaders,
- caching among other performance boosting techniques.
High Performance Implementations
Choosing the right software can provide huge performance gains using the same hardware.
It is common to find Internet users connecting continuously to web pages. For example, social sites stream friend data without user intervention. Similarly, Internet radio and video serve content periodically, in such scenarios it is important to implement high performance applications for handling high-concurrency while maintaining low hardware costs.