The most dangerous period within the lifecycle of any software is the space of time starting from the developer’s identification of the vulnerability up to the publication of the patch aimed to eliminate it. Notwithstanding that manufacturers declare continuous enhancing and refining their software programs, from a couple of weeks through a year can usually elapse between detection and publication of the error/vulnerability information to the elimination thereof. Software is especially vulnerable during this period of time.
We created our own laboratory to study the security of various software/hardware solutions, which allows us to be always one step ahead of intruders.
Within the framework of the laboratory’s activities, the penetration tests and the comprehensive evaluation of the information security levels of the most widely-used and popular solutions are performed.
Having our own Laboratory of Vulnerabilities, we can identify the vulnerabilities of software/hardware and widely-used information systems as promptly as possible.