• Internet

  • Financial

  • Carriers

  • Government

  • IOT

  • Game

online sales, catering, social, tourism, video, reading, express logistics and other Internet Life services
  • Security risks

    With the rapid popularization of internet in traditional industry, the O2O service mode of internet + life service provides more convenience for people's life. At the same time of high speed development, huge security risks also in quietly breeding.。

    For example::

    Fake apps by decompilation, repacking and placeing ads in apps.Identity theft & invasion of privacy,Hijacking, tampering and forgery of transaction data.

    Solutions

    For each segment of the Internet, according to its characteristics, customized proprietary solutions for the e-commerce industry to provide a complete security testing and reinforcement solutions for the reading, video and other industries for resource encryption, data integrity protection, content tamper protection measures. Testin Security has a large number of successful cases of mobile internet customers, we can greatly enhance the security of the enterprise, improve developer benefits, reduce operating and maintenance costs.

    Security testing services: According to the relevant standards of the security industry, combine manual testing with tools. Fucus on the weaknesses of Android, IOS and Web system, and coduct in-depth analysis and mining technical on flaws or vulnerabilities, then generate detailed test report.

    Mobile applications security reinforcement services:Provide the security reinforcement for Android, IOS applications. Avoid the threat such as be decompiled, debugging, the piracy, re-packing after the application distribution, which can reduce the threat of mobile application with efficiently and cheaply .

    Mobile application channel monitoring service:Real-time monitoring of mobile applications in the mainstream application market. Prevent piracy and malicious behavior, and avoid the damage of financial and credibility.

    Compatibility test service:Fully detect the compatibility of mobile applications on various models. Capture the problem including no response,UI exception, crash and other issues during the period of installation and uninstall.Generate the professional compatibility test report for enterprise.

    Data and resource protection:Protect the security of application source code, resource files, configuration files, etc. Ensure the integrity and availability of data and files.

    Source code audit services:Conduct white box test for the source code of enterprise, in-depth analysis of the entire source code. Find the threat and ccurate verification it. Propose rectification opinions for the security vulnerability points. Reject the insecurity system goes online.

Banking, securities, insurance and other traditional financial services; Peer-to-peer, tripartite payment,Public and otherInternet Financial Products
  • Security risks

    With the rapid development of "Internet + Finance". Traditional financial services and products are being actively transferred to the internet, bringing more convenient and fast financial and payment experience to users. In such a fast Internet process, the introduction of a huge security risks.

    For example::

    Client funds transferred & stolen;Theft, sale, and exploitation of users' private information for accurate fraud;Hijacking, tampering and forgery of transaction data

    Solutions

    The security risks arising from the high combination of traditional finance and Internet provide a security and reliable solution for mobile financial services and products such as banks, securities, p2p, etc., guaranteeing the security of application systems.

    Business security consulting:To help enterprises upgrading of security management capabilities design, development, release, operation and other aspects.Ensure the legitimacy, reliability, extensibility and foresight of its business security system.

    Security training:Help companies understand the common security issues and basic solutions in financial industry. Training enterprise staff security awareness, understand security development norms.

    Mobile application security detection:Mining the vulnerabilities and security risks of mobile application, and verifying the authenticity and availability of each vulnerability and risk, providing detailed security test results and repair recommendations.

    Host security protection:Provides comprehensive security protection for the threats faced by hosts on the network. Rapid positioning, isolation of threat attacks, timely cut off the victim's network system in the event of infection, and prevent further spread of the threat.

    Mobile applications security reinforcement services: Provide the security reinforcement for Android, IOS applications. Avoid the threat such as be decompiled, debugging, the piracy, re-packing after the application distribution, which can reduce the threat of mobile application with efficiently and cheaply .

    Commercial password security evaluation:Evaluate the validity, correctness and effectiveness of password used in network and information system, and make suggestions for them. Ensure the legitimacy and security in password usage.

    Mobile application channel monitoring service:Real-time monitoring of mobile applications in the mainstream application market. Prevent piracy and malicious behavior, and avoid the damage of financial and credibility.

    Data and resource protection:Protect the security of application source code, resource files, configuration files, etc. Ensure the integrity and availability of data and files.

    Legitimacy test:According to the National Financial Supervision Unit security standards, industry security standards, financial industry security level protection standards and other standards. Ensure the security and legitimacy of the business.

Mobile business Hall, billing channel, application distribution store, video, reading and living expenses and other value-added services
  • Security risks

    With the rapid development of informationization of operators, the network system composed of line network, core network, bearer network, service network, support network and transmission network has entered a perfect stage. Due to the strong privacy of operators and the large number of users, the security threats are also special and tendentious.

    For example::

    Theft, sale, and exploitation of users' private information for accurate fraud Extortion of target users through malicious bundling of viruses and trojans Decompiling app and cracking carriers' mobile application billing SDK

    Solutions

    Through the application of reinforcement, penetration testing, security consulting and other means to improve the overall operationBusiness SystemSecurity, while focusing on privacy data leakage, Billing SDK security assessment, provide security measures to eliminate risk.

    Mobile application security detection:Mining the vulnerabilities and security risks of mobile application, and verifying the authenticity and availability of each vulnerability and risk, providing detailed security test results and repair recommendations.

    Compatibility test service: Fully detect the compatibility of mobile applications on various models. Capture the problem including no response,UI exception, crash and other issues during the period of installation and uninstall.Generate the professional compatibility test report for enterprise .

    Mobile applications security reinforcement services:Provide the security reinforcement for Android, IOS applications. Avoid the threat such as be decompiled, debugging, the piracy, re-packing after the application distribution, which can reduce the threat of mobile application with efficiently and cheaply .

    Billing protection::Consolidation carriers' billing SDK to prevent it from being debugged, tampered with and cracked, effectively reducing the security risk and avoiding economic loss.

    Mobile application channel monitoring service:Real-time monitoring of mobile applications in the mainstream application market. Prevent piracy and malicious behavior. According to the needs of users remove the piracy applications from store.

    Commercial password security evaluation:Evaluate the validity, correctness and effectiveness of password used in network and information system, and make suggestions for them. Ensure the legitimacy and security in password usage.

Central and local government agencies, energy exploitation and management agencies, medical research and service institutions, etc.
  • Security risks

    With the rapid and efficient office and management of the government agencies, the demand for the security of the system is becoming more and more intense with the development of the mobile informatization in the enterprises. The risks of this kind of government function system

    For example::

    Tampering with apps to propagate illegal or inappropriate comments;Vulnerabilities in business systems lead to system intrusion and continuous contro;The application of local data leakage caused by the authentication information, system information and other sensitive information leakage;

    Solutions

    Testin security team to assist enterprises and enterprises to strengthen risk prevention measures, improve safety management mechanism, improve staff safety awareness, combined with testin excellent security services, comprehensively protect the security of the assessed system.

    Information security management system construction services:Reference to international standards ISO27001,ISO27002, as well as domestic standards GB/T22080、GB/T22081. According to the complete management process of PDCA, help enterprises to build, authenticate and maintain a complete and effective information security management system (ISMS). Provide security for the operation of the business.

    Grade protection construction:To help enterprises to understand and build information security level to meet the basic requirements of the information system, to ensure that it conforms to national and industry information security level of protection of regulatory requirements.

    Information security infrastructure construction:Help enterprises to build a sound information security infrastructure, including firewalls, encryption machines, anti-virus equipment (hardware and software), electromagnetic interference shielding equipment, intrusion detection equipment, disaster recovery equipment, etc., to prevent unauthorized access to data or malicious system attacks.

    Security testing services: According to the relevant standards of the security industry, combine manual testing with tools. Fucus on the weaknesses of Android, IOS and Web system, and coduct in-depth analysis and mining technical on flaws or vulnerabilities, then generate detailed test report.

    Mobile applications security reinforcement services: Provide the security reinforcement for Android, IOS applications. Avoid the threat such as be decompiled, debugging, the piracy, re-packing after the application distribution, which can reduce the threat of mobile application with efficiently and cheaply .

    Host security protection:Provides comprehensive security protection for the threats faced by hosts on the network. Rapid positioning, isolation of threat attacks, timely cut off the victim's network system in the event of infection, and prevent further spread of the threat.

    Commercial password security evaluation:Evaluate the validity, correctness and effectiveness of password used in network and information system, and make suggestions for them. Ensure the legitimacy and security in password usage.

Intelligent network of cars, smart home (home, home appliances), smart dress, intelligent city
  • Security risks

    With the development of IOT technology, a large number of access to the network equipment into all aspects of life, in the convenience and comfort into every corner of life, but also brought more serious security threats.

    For example::

    Tampering, forgery, management and operation of arbitrary intelligent devices for identity authentication and operation instructions;Key management, security-configured errors that result in secret key leaks, unauthorized access;Management system vulnerability caused by user privacy information, equipment information and other important information leakage.

    Solutions

    The Testin security is based on the perceptual layer of the Internet of things, the basic structure of the network layer and the application layer, and the deep combination of cloud-tube-end of the IOT architecture, providing a complete set of advanced and effective security solutions.

    Security advisory services:Help customers to understand the status of security and risk, the use of appropriate control measures to build a comprehensive, effective and legal Information security management system, the overall promotion of enterprise information security management maturity, and security.

    Security advisory servicesFocus on intelligent network for IoT industry. Conduct security test on intelligent hardware, cloud platform, mobile applications, and potential security risks in communication between them. Protect the security in cloud-tunnel-termal of ioT network.

    Security Reinforcement Services:According to the result of the safety test, provide the security reinforcement service for the risk part, and provideSDKEncryption service, to strengthen the communication data to ensure the security of communication links such as transactions.

    Host security protection:Provides comprehensive security protection for the threats faced by hosts on the network. Rapid positioning, isolation of threat attacks, timely cut off the victim's network system in the event of infection, and prevent further spread of the threat.

mobile games, web games, PC games
  • Security risks

    The game industry's high investment, high returns, not only to the game manufacturers to bring a huge profit, but also become a hacker attack, black ash production of the hardest hit. Security risks abound.

    For example::

    Game plug on gold coins, attributes of malicious modification, resulting in shortened game life cycle, user churn; Malicious extortion by embedding malicious code in a way that causes a disorderly deduction; Through the reverse compilation of internal purchase business, resulting in loss of funds.

    Solutions

    Testin security for the game industry plug-in cheating Pain Point, provides a set of security penetration testing, mobile applications security reinforcement, host security, security consulting services such as a complete package of security solutions

    Security Penetration TestActive mining game business security vulnerabilities, including communication protocol security, script logic security, memory data security, static resource security, local data security. Expose game potential security risks ahead of time and provide recommendations for risk resolution.

    Mobile applications security reinforcement services: Provide the security reinforcement for Android, IOS applications. Avoid the threat such as be decompiled, debugging, the piracy, re-packing after the application distribution, which can reduce the threat of mobile application with efficiently and cheaply .

    Host security protection:Provides comprehensive security protection for the threats faced by hosts on the network. Rapid positioning, isolation of threat attacks, timely cut off the victim's network system in the event of infection, and prevent further spread of the threat.

    Compatibility test service:Fully detect the compatibility of mobile applications on various models. Capture the problem including no response,UI exception, crash and other issues during the period of installation and uninstall.Generate the professional compatibility test report for enterprise .

    Mobile application compression servicesHelp game developers to compress the package without impacting the user experience. It can reduce game operating costs and increase the number of game download.

Name

Email

Telephone

Verification Code