
YOUR INFRAESTRUCTURES UNDER CONTROL
- drydIP 10
- Automatic external IP scanning
- Manual exploitation and false positives discard
- Final results
- Validation of vulnerability resolution
- From 1 to 10 analyzed IPs
- drydIP 20
- Automatic external IP scanning
- Manual exploitation and false positives discard
- Final results
- Validation of vulnerability resolution
- From 11 to 20 analyzed IPs
- drydIP 30
- Automatic external IP scanning
- Manual exploitation and false positives discard
- Final results
- Validation of vulnerability resolution
- From 21 to 30 analyzed IPs


SAFEGUARDED BROCHURES* AGAINST CYBERCRIMINALS
WEB APPLICATIONS PROTECTED FROM CYBERCRIMINALS
- drydWEB BROCHURE
- Automated audit & data entry control
Automatic application audit
Data entry validation audit - Final results
- Validation of vulnerability resolution
(*Brochure: simple web withno data base interaction)
- drydWEB Application BASIC
- Automated audit
Public vulnerabilities search
Automated data entry validation audit - Manual audit and data entry control
Manual application audit
Data entry validation manual audit
False positives verification - Authorization and authentication
Identification & authentication processes audit
False user & false sessions full prevention audit
Authorization audit - DDoS Protection**
DDoS situations audit - Business processes
Business logic vulnerabilities audit - Final results
- Validation of vulnerability resolution
- drydWEB Application OPTIMAL
- Automated audit and data entry control
Automated application audit
Data entry validation audit - Manual audit and data entry control
Manual application audit
Manual data entry validation audit
False positives verification - Authorization and authentication
Identification & authentication processes audit
False user & false sessions full prevention audit
Authorization audit - DDoS Protection**
DDoS situations audit - Business processes
Business logic vulnerabilities audit - Final results
- Validation of vulnerability resolution
- drydWEB Application FULL
- Automated audit and data entry control
Automated application audit
Data entry validation audit - Manual audit and data entry control
Manual application audit
Manual data entry validation audit
False positives verification - Authorization and authentication
Identification & authentication processes audit
False user & false sessions full prevention audit
Authorization audit - DDoS Protection**
DDoS situations audit - Business processes
Business logic vulnerabilities audit - Final results
- Validation of vulnerability resolution
(**Discarded bandwith overflow situations)

CYBERSECURITY FOR YOUR COMPANY AND CLIENTS IN OWN APPS
- drydAPP SECURED Basic
- Performance and permissions audit
Permission audit according to the set functionality
App performance audit to detect malicious activity - Net traffic analysis
Encrypted network traffic verification
Blacklist IP verification
IP’s and URL’s app connection list - Leak of information detection
Keep of sensitive information in HD and leak of information analysis
Use of obsolete components - Hostile environment or compromised terminal detection
Jailbreak / root control detection
Anti-debug control detection
Certificate Pinning use detection - Authorization and authentication
Identification and authentication process audit
Log in management audit in order to avoid fraudulent users
Authorization audit
Injection tests - Business processes
Business logic vulnerabilities audit - Final results
- Validation of vulnerability resolution
- drydAPP SECURED One
- Performance and permissions audit
Permission audit according to the functionality
App performance audit to detect malicious activity - Net traffic analysis
Encrypted network traffic verification
Blacklist IP verification
IP’s and URL’s app connection list - Leak of information detection
Keep of sensitive information in HD and leak of information analysis
Use of obsolete components - Hostile environment or compromised terminal detection
Jailbreak / root control detection
Anti-debug control detection
Certificate Pinning use detection - Authorization and authentication
Identification and authentication process audit
Log in management audit in order to avoid fraudulent users
Authorization audit
Injection tests - Business processes
Business logic vulnerabilities audit - Final results
- Validation of vulnerability resolution
- drydAPP SECURED Optimal
- Performance and permissions audit
Permission audit according to the functionality
App performance audit to detect malicious activity - Net traffic analysis
Encrypted network traffic verification
Blacklist IP verification
IP’s and URL’s app connection list - Leak of information detection
Keep of sensitive information in HD and leak of information analysis
Use of obsolete components
Biometric components use - Hostile environment or compromised terminal detection
Integrity check
Jailbreak / root control detection
Anti-debug control detection
Certificate Pinning use detection - Authorization and authentication
Identification and authentication process audit
Log in management audit in order to avoid fraudulent users
Authorization audit
Injection tests - Business processes
Business logic vulnerabilities audit - Final results
- Validation of vulnerability resolution
- drydAPP SECURED Full
- Performance and permissions audit
Permission audit according to the functionality
App performance audit to detect malicious activity - Net traffic analysis
Encrypted network traffic verification
Blacklist IP verification
IP’s and URL’s app connection list - Leak of information detection
Keep of sensitive information in HD and leak of information analysis
Use of obsolete components
Biometric components use
Search of strings with sensitive information (ID, sandbox, etc.) - Hostile environment or compromised terminal detection
Integrity check
Jailbreak / root control detection
Anti-debug control detection
Certificate Pinning use detection - Authorization and authentication
Identification and authentication process audit
Biometric access control
Log in management audit in order to avoid fraudulent users
Authorization audit
Injection tests - Business processes
Business logic vulnerabilities audit - Final results
- Validation of vulnerability resolution
Available: iOS and Android

CONTROL THE SECURITY OF THE EXTERNAL APPS USED IN YOUR DEVICES
- drydAPP PROTECT
- Performance and permissions audit
Permission audit according to the functionality
App performance audit to detect malicious activity - Network traffic analysis
Encrypted network traffic verification
Blacklist IP verification
IP’s and URL’s app connection list - Final results
- Validation of vulnerability resolution
Available: iOS, Android and Windows Phone
drydØr is a WISE Security Global product.
Visit us at wsg127.com
Legal Notice and Privacy Policy
Cookies Policy
© 2021 – WISE Security Global. All rights reserved
BARCELONA
C/ Vía Augusta, 94-Entreplanta - 08006
MADRID
C/ Miguel Yuste, 6 - 2º C - 28037
+34 910 700 549 | info@drydor.com
C/ Vía Augusta, 94-Entreplanta - 08006
MADRID
C/ Miguel Yuste, 6 - 2º C - 28037
+34 910 700 549 | info@drydor.com