tooltip
{{SelectedCountryName}}
  • {{country.Country1}}
{{SelectedStateAbbr}}
  • {{state.State1}}
{{SelectedCountyName}}
  • {{county.CountyName}}
{{SelectedCityName}}
  • {{city.City}}
{{SelectedNeighborhoodName}}
  • {{neighborhood.NeighborhoodName}}
Businesses
  • Home
  • News
  • Businesses
  • Stores
  • Products
  • Classifieds
  • Images
  • Videos
  • Blogs
  • People
  • Topics
  • Deals
spacer
  • Home
  • Scroll
  • Grid
  • Thumb
  • List
  • 4 Box

Information Technology

    Businesses
    • Board
    • Stores
    • Businesses
    • People
    • Products
    • Videos
    • Images
    • Blogs
    • Audios
    • Coupons
    • Deals
    • Classifieds
    • Networks
    • Groups
    • Forums
    • Maps

    Zigrin Security

          next
    Zigrin Security Icon
    About
    Zigrin Security started in 2017 as a response to the growing need for cyber security assessments of web & mobile applications, network infrastructure and industrial control systems. The company specialises in penetration testing of different applications from sectors such as E-commerce, banking, financial, insurance, healthcare and military.
    Location
    Poznan, Poland
    Map It! 
    City
    Poznan, Poland 
    Contact
    Send a Message
    Directory Category Information Technology
    Business Categories
    Information Technology
    Years In Business
    6 Years
    Website
    https://zigrin.com/
    Social Media Profiles
    Zigrin on LinkedIn Icon Zigrin on LinkedIn
    Like on Facebook!
    Specializes In
    We are cybersecurity experts offering comprehensive, hands-on security testing of networks, applications, cloud-based solutions, e-commerce applications, and mobile devices. The list of our clients includes companies and organizations from all over Europe. Our services: WEB APPLICATION SECURITY TESTING - we test your web applications to detect issues that could lead unauthorized third parties to take control of them. NETWORK PENETRATION TESTING - we test the security of your network to check its resilience against unauthorized access attempts. VULNERABILITY ASSESSMENT - we periodically check weaknesses in your infrastructure. RED TEAMING - we simulate Advanced Persistent Threats attacks on information systems to detect their vulnerabilities. MOBILE APPLICATION PENETRATION TESTING - we check whether users of your application or outsiders can cause harm to the company or other users. SOURCE CODE REVIEW - we review the source code of your systems and applications to check for vulnerabilities.