Skip Ribbon Commands
Skip to main content

NNIT Application Security Team identifies and manages your application security risks


A decade of infrastructure and network hardening has pushed hackers up the technology stack to exploit application security vulnerabilities as the easiest entry to your critical business systems. Gartner formulates this as "Perimeters and firewalls are no longer enough; every app needs to be self-aware and self-protecting". However, the IT industry in general has not matured its application security capabilities. Application security is for many vendors and organizations still a secondary concern until a security breach has occurred and is detected. But with the new EU General Data Protection Regulation and the substantial administrative fines it imposes on data leaks of personally identifiable information companies can no longer afford that approach. 


We assess the security of your applications through the use of best practice techniques, state-of-the-art tooling and our great experience in building and assessing highly critical and secure applications.

Assessments can be executed…

  • during development
  • before go-live
  • for a live application

…and will be tailored to your requirements. 


By the end of an assessment you will have:

  • A clear picture of the security state of your application with respect to best practices for securing personally identifiable information and business critical functionality
  • A risk based classification of any detected vulnerabilities
  • A description of how to mitigate the detected vulnerabilities to prevent security breaches and data loss. ​​​​​

We also have the capabilities to help you fix the vulnerabilities identified.


A team of highly skilled professionals, specialized in designing, implementing and testing applications with critical security requirements. It is on that solid foundation in application security we assess customer applications to identity, risk evaluate and advise on mitigations.







Thomas Lund Erichsen+4530756951tmln@nnit.comManager - Application Security Lund Erichsen



Application Security Security
Cyber Defense Center Defense Center
Identity & Access Management & Access Management
The Fine Art of Aligning Business Strategy and Information Security Strategy Fine Art of Aligning Business Strategy and Information Security Strategy
​​​Building a sustainable defence: How to secure your operational technology (OT) environment​​​​Building a sustainable defence: How to secure your operational technology (OT) environment​
COWI Upgrades its IT Security Upgrades its IT Security
Breach Preparedness Preparednes.aspxBreach Preparedness
Control Your Security & Privacy in the Cloud Your Security & Privacy in the Cloud
NNIT Security Insights Security Insights
Identity and Access Management Consultancy and Access Management Consultancy