Palindrome Technologies’s effective security analysis methodology is based on a multidimensional framework driven by both “Deterministic” and “Non-Deterministic” models, which leverages proprietary techniques and tools, industry standards (e.g., NIST, OWASP, PTES) and past experience from evaluating enterprise and carrier-grade network applications.
We break code, because we care !
We perform security analysis on all kinds of applications ranging from small web applications to large critical communication infrastructure platforms. In particular, client applications which interact with external actors where trust relationships cannot be established are most vulnerable, for example, Web Applications, Mobile Applications, VoIP Applications, Email Applications and Social Engineering, and Wireless Networks.