CAREERS

Ethical Hacking for your business’s cybersecurity

 The best experts and our most advanced method. We ensure the
protection of your company.

 

Drydor

 

drydØr is a vulnerabilities management and scanning service, which detects your systems danger states. Automatically, it scans the services that are exposed to the Internet and its applications. It offers reporting with personalized reports of each audit, which include recommendations for the resolution of each cybersecurity breach. drydØr is a Wise Security Global brand, guarantee of cybersecurity quality.

Choose the pack which suits better your company´s needs

drydIP

Your infrastructures under control

Know in detail the security breaches of any software installed in your computer systems, in order to prevent the access of cybercriminals.

drydweb

Scan brochures and apps

Assure with drydor that the websites you use and the online platforms with which you work are trustworthy. And find a solution to those that have vulnerabilities.

drydapp secured

Analyse your company’s apps

Take control of any vulnerability contained in the apps your company develops and launches onto the market for your clients and users to use.

drydapp protect

Secure your external apps

Be assured that the apps that your staff use on your company’s devices are reliable and they are not an accesible gateway for cybercriminals.

More information - Download PDF

Remove the weak points a cybercriminal would use to damage your company and obtain our zero holes assurance

Check

Applicability

Pharma Industry

Economic Sector

Consulting Sector

Functions

  • FULL SERVICE: drydØr offers you a full security service  in your apps, both own and third-party.
  • SOLUTIONS: We help you to solve infrastructure, web apps and mobile apps security breaches.
  • AVOID RISKS: We seal your business’ doors from cybercriminals thanks to the vulnerabilities detection.

EFFICIENT: 80% of the audit processes made with drydør are automatic.

 

EFFECTIVE: Our best analysts and engineers at your company’s service.

 

NON-INTRUSIVE: On-cloud service with our team of professionals for your peace of mind at the process.

 

CONTROLLED: Design of regular, swift and semiautomatic audits.

CyberSecurity

Project: Haunt Keeper

Cybersecure networks for leadership at Faes Farma: protection even when working remotely.

CyberSecurity

Project: Haunt Keeper

Cybersecure networks for leadership at Faes Farma: protection even when working remotely.

drydØr
Ethical Hacking
Zero Holes

Cybersecurity
APP
Web

Technology
Secured
Protect

They trust in Wise Security Global

drydIP 10

Automatic external IP scanning

Manual exploitation and false positives discard

Final results

Validation of vulnerability resolution

From 1 to 10 analyzed IPs

drydIP 20

Automatic external IP scannin

Manual exploitation and false positives discard

Final resultsValidation of vulnerability resolution

From 11 to 20 analyzed IPs

drydIP 30

Automatic external IP scanning

Manual exploitation and false positives discard

Final results

Validation of vulnerability resolution

From 21 to 30 analyzed IPs

DRIDWEB APPLICATION BASIC

Automated audit
Public vulnerabilities search
Automated data entry validation audit

Manual audit and data entry control
Manual application audit
Data entry validation manual audit
False positives verification

Final results

Validation of vulnerability resolution

DRIDWEB APPLICATION OPTIMAL

Automated audit and data entry control

Automated application audit
Data entry validation audit

Manual audit and data entry control
Manual application audit
Manual data entry validation audit
False positives verification

Authorization and authentication
Identification & authentication processes audit
False user & false sessions full prevention audit
Authorization audit

DDoS Protection**
DDoS situations audit

Final results

Validation of vulnerability resolution

DRIDWEB APPLICATION FULL

Automated audit and data entry control
Automated application audit
Data entry validation audit

Manual audit and data entry control
Manual application audit
Manual data entry validation audit
False positives verification

Authorization and authentication
Identification & authentication processes audit
False user & false sessions full prevention audit
Authorization audit

DDoS Protection**
DDoS situations audit

Business processes
Business logic vulnerabilities audit

Final results

Validation of vulnerability resolution

DRIDAPP SECURED BASIC/ ONE

Performance and permissions audit
Permission audit according to the set functionality
App performance audit to detect malicious activity

Net traffic analysis
Encrypted network traffic verification
Blacklist IP verification
IP’s and URL’s app connection list

Leak of information detection
Keep of sensitive information in HD and leak of information analysis
Use of obsolete components

Hostile environment or compromised terminal detection (only for one option)**
Jailbreak / root control detection
Anti-debug control detection
Certificate Pinning use detection

Final results

Validation of vulnerability resolution

DRIDAPP SECURED OPTIMAL

Performance and permissions audit
Permission audit according to the functionality
App performance audit to detect malicious activity

Net traffic analysis
Encrypted network traffic verification
Blacklist IP verification
IP’s and URL’s app connection list

Leak of information detection
Keep of sensitive information in HD and leak of information analysis
Use of obsolete components
Biometric components use

Hostile environment or compromised terminal detection
Integrity check
Jailbreak / root control detection
Anti-debug control detection
Certificate Pinning use detection

Authorization and authentication
Identification and authentication process audit
Log in management audit in order to avoid fraudulent users
Authorization audit
Injection tests

Final results

Validation of vulnerability resolution

DRIDAPP SECURED FULL

Performance and permissions audit
Permission audit according to the functionality
App performance audit to detect malicious activity

Net traffic analysis
Encrypted network traffic verification
Blacklist IP verification
IP’s and URL’s app connection list

Leak of information detection
Keep of sensitive information in HD and leak of information analysis
Use of obsolete components
Biometric components use
Search of strings with sensitive information (ID, sandbox, etc.)

Hostile environment or compromised terminal detection
Integrity check
Jailbreak / root control detection
Anti-debug control detection
Certificate Pinning use detection

Authorization and authentication
Identification and authentication process audit
Biometric access control
Log in management audit in order to avoid fraudulent users
Authorization audit
Injection tests

Business processes
Business logic vulnerabilities audit

Final results

Validation of vulnerability resolution

DRIDAPP PROTECT

Performance and permissions audit
Permission audit according to the functionality
App performance audit to detect malicious activity

Network traffic analysis
Encrypted network traffic verification
Blacklist IP verification
IP’s and URL’s app connection list

Final results

Validation of vulnerability resolution