Your security Assured
We specialize in penetration testing of IT infrastructure, Active Directory, web applications and smartphone apps. Our pentest reports include concise issue descriptions, concrete evidence, security risk assessments as well as recommendations for remediation and mitigation.
Our Threat Landscape Assessment (TLA) is a highly appreciated service where we passively gather intelligence about your environment to assess your security perimeter, online footprint and attack surface. It provides good insight to necessary security assessments and engagements.
We are specialized in all areas within the domain of technical information/cyber security and describe key areas of expertise here.
Our consultants have many years experience of securing web- and native/desktop applications. We conduct penetration tests, code reviews and provide security advisory.
We assess the security posture of smartphone applications through penetration testing and code reviews.
IT infrastructure as a concept has been rapidly evolving and expanding. We have been involved in pushing the development of security within modern infrastructures for several years.
Ever since we started putting computers in vehicles and connecting them to outside systems, consultants at Assured have been involved in securing those systems and networks.
The advent of IoT has brought a number of new security challenges to the forefront. We are continuously involved with performing security reviews of embedded devices and their communications.
Our team of senior security specialists provide world class IT/information security competence.
We began in 2015 in Gothenburg, Sweden with an idea: let's build a boutique consultancy based around a shared passion for security.
We support our customers with security expertise, we are an active pillar of the security community and involved in security research.
Working as a team is key for running a successful business, as well as delivering at the highest level for our customers. Everyone at Assured has a skillset and a personality which enhances this shared vision. While we often find ourselves in an advisory or teaching role, we believe that continuous learning and personal development within our chosen field is vital to staying relevant in the security field.
We believe that security should be non-blocking and transparent and we apply these values not only in the work we perform, but also in how we work internally. There are no closed doors or unreasonable questions – transparency is key.
We are always growing, and we'd love to grow with you, whether you are a prospective client or a potential new-hire, don't hesitate to contact us!
In our team of expert consultants you find a diverse and highly skilled set of people for all your technical IT security needs.
Are you the person we are looking for?
You probably have a burning passion for technical IT Security and documented experience working with penetration tests, cryptography, infrastructure reviews, web security, embedded security, mobile security, forensics, or similar fields. If so – we would love to have you come work with us!
Our research, current events and catching up on interesting security news.
A rundown on how to get started using the new Tillitis TKey, writing an application for the device and using the TKey for authentication on a Linux system.
Common issues (often related to lacking network access control) found across various IT infrastructures, regardless of the organization or industry.
Our office is conveniently located in central Gothenburg. You are welcome to stop by for a coffee and say hello, or get in touch via phone or email!
Email us at email@example.com