preload preload preload preload

Enterprise Security Assessment

Application Security

Application Security

In today’s highly competitive business landscape many organizations are moving mission critical processes to the Internet. Web based services are replacing traditional business practices in an effort to optimize customer management, supplier communications, and ultimately create a market differentiating advantage.

As the use of web applications has expanded, the risks to them, and the business, have shown a corresponding increase. Efforts to allow easier access to operational, customer, and supplier information inevitably bring the possibility of compromised access to confidential data and network resources.


Successfully implementing the powerful benefits of Web based technologies cannot be achieved without a consistent approach to web application security. A|D’s Application Security Assessment Services are designed to assist your organization with the identification and mitigation of web application vulnerabilities that may pose a risk to the confidentiality, integrity, and availability of sensitive data. Utilizing a combination of automated and manual assessment techniques, our professionals take a systematic approach to identify flaws in custom, third party, or commercial of the shelf (COTS) applications that evade detection from traditional assessment procedures. This approach, combined with proven methodologies from the Open Web Application Security Project (OWASP), the Web Application Security Consortium (WASC), Microsoft, and others is designed to evaluate implemented security controls and protocols against recognized practices.

As with all of A|D’s assessment services, Application Security Assessments are highly customizable depending on the client’s specific requirements and scope, representative services include:


At the conclusion of the engagement, A|D will deliver a detailed and comprehensive report that can be tailored to meet the specific needs of executives, management, and business personnel alike. Our reports typically include an executive summary, immediate needs report, detailed technical findings, risk management recommendations, and detailed illustrations, as needed.

If you would like to learn more about having A|D conduct Application Security Assessments services, please .

Return to top »