Skip Ribbon Commands
Skip to main content

Application Security

Are your critical business data secure?

We see lots of examples in the news about data breaches. Most of the attacks are carried out by exploiting vulnerabilities in applications.
For many years security has been focused on perimeter controls, such as firewalls. However, in a world where everything is connected this is far from enough.
Applications that previously were only accessible within the corporate network can now be accessed from e.g. mobile devices. Even if your applications don’t have access to critical assets they must be secure since attackers can exploit  applications to gain access to other critical assets within your company.

NNIT has a team of developers and architects specializing in application security, we have among other things developed Nemlog-In. 

    

We can help you with:

  • Application assessment of via interview with developers and penetration testing

  • Training your developers in application security principles

  • Providing application security coaching to help your development team implement secure software development lifecycle

  • General application security design and implementation advisory such as single sign-on solutions, privacy design, threat modelling and design review.

We know how to find the vulnerabilities and we can help you fix them.


 

 

 

 

Thomas Lund Erichsen+4530756951tmln@nnit.comManager - Application Securityhttps://dk.linkedin.com/in/thomas-lund-erichsen-9177062Thomas Lund Erichsen

 

 

Identity and Access Management Consultancyhttps://www.nnit.com/OfferingsAndArticles/Pages/-Identity-and-Access-Management-Consultancy.aspxIdentity and Access Management Consultancy
Identity & Access Managementhttps://www.nnit.com/cybersecurity/Pages/iam.aspxIdentity & Access Management
NNIT Security Insightshttps://www.nnit.com/cybersecurity/Pages/security-insights.aspxNNIT Security Insights
Cyber Defense Centerhttps://www.nnit.com/cybersecurity/Pages/Cyber Defense Center.aspxCyber Defense Center
Security Advisoryhttps://www.nnit.com/cybersecurity/Pages/security-advisory.aspxSecurity Advisory
Risky Business?https://www.nnit.com/OfferingsAndArticles/Pages/Risky-Business.aspxRisky Business?
The Fine Art of Aligning Business Strategy and Information Security Strategyhttps://www.nnit.com/OfferingsAndArticles/Pages/The-Fine-Art-of-Aligning-Business-Strategy-and-Information-Security-Strategy.aspxThe Fine Art of Aligning Business Strategy and Information Security Strategy
​The C.I.A. of application security!https://www.nnit.com/OfferingsAndArticles/Pages/ApplicationSecurity.aspx​The C.I.A. of application security!
​​​Building a sustainable defence: How to secure your operational technology (OT) environment​https://www.nnit.com/OfferingsAndArticles/Pages/BuildingSustainableDefence.aspx​​​Building a sustainable defence: How to secure your operational technology (OT) environment​
How to Keep Industrial Computer Systems (ICS/SCADA) Running in an Age of Cybercrime?https://www.nnit.com/OfferingsAndArticles/Pages/How-to-Keep-Industrial-Computer-Systems-(ICSSCADA)-Running-in-an-Age-of-Cybercrime.aspxHow to Keep Industrial Computer Systems (ICS/SCADA) Running in an Age of Cybercrime?