+383 (0) 49 949 166 [email protected]

use case

Security Testing & Audit

Penetration Testing & Security Code Reviews

Challenge

A U.S based investment firm was in the process of performing due diligence with a famous financial exchange platform based on Zug, Switzerland as part of their acquirement process. The investment firm was interested in acquiring the financial organization as a whole as well as all of their intellectual property which included a trustless asset exchange, mobile applications for asset management, and the infrastructure on top of which it is built.

Before committing to acquiring and enabling a multi-million dollar investment, the Sentry team developed a baseline for assesing the security of the asset exchange on a technical level.

Are Applications and all of their components built with security in mind?

  • If yes, do said Applications and all of their components include the security features that have been claimed?
  • If yes, do these security features align with industry standards and best practices?
  • If not, are there any known vulnerabilities or perceived dangers to the said Applications and all of their components?

Are Applications and all of their components following security practices, both technical and procedural set by credible and expert sources?

  • If yes, are said Applications and all of their components thoroughly tested and/or peer-reviewed by external credible and expert sources?
  • If yes, have said Applications and all of their components been evaluated positively by external credible and expert sources?
  • If not, are there any issues that would compromise the solutions provided by said Applications and all of their components?

Do Applications and all of their components require additional investments regarding security?

  • If yes, do these investments extend beyond the organization’s resources (eg. External Experts, Investing in New Technologies, Enhancing or expanding the current technical/non-technical team?
  • If yes, are these investments realistic from a technical security standpoint?
  • If not, is there anything that can be utilized/salvaged from existing security implementations in providing added value to current/other business opportunities.

For this due diligence step, the U.S Investment firm has asked Sentry to step in and evaluate the potential investment from a security perspective.

 

Solution

In order to provide satisfactory insights on the following inquiries, we have performed the following:

  1. A general/technical report containing a thorough security analysis of the solution architecture in a live production-grade environment.
  2. A general/technical report containing a thorough security analysis of all supporting technologies implemented in the environment.
  3. A general/technical report illustrating the results of Dynamic Tests for identifying security vulnerabilities, validating security controls, testing security functionality, and identifying mitigation or improvement strategies.
  4. An in-depth/technical report outlining expert peer-reviewed observations, both objective and subjective, specifically aimed at core functionalities – In this case: Cryptography, Programming/Code, Cyber/Information security.
  5. An in-depth/technical analysis of emerging security threats in the foreseeable future that may compromise the solution offered by the project, and/or concept flaws that are apparent in the present.

Success

All of the analysis performed by Sentry helped the U.S investor gain clarity in what exactly they were acquiring from a security perspective. Our reports illustrated that while all of the critical security components were built with security in mind, not enough testing and peer reviewed analysis has been done in order to assume that the system is safe to use and production ready.

Many of the components had best security practices implemented in them, however critical vulnerabilities have been identified residing within the codebase of some of the most crucial components. Furthermore, there have been novel security mechanisms introduced that have not been thoroughly tested or implemented in the industry. Although the algorithms have been innovative and efficient and could be developed as a product on their own, it was found out that they did not belong to the financial exchange, and would be excluded from the IP acquirement – something that was not disclosed prior to testing and security code reviews.

Our findings have been a game changer for our client – giving Sentry the experience of contributing into making a sound multi-million dollar decision. Sentry has protected US investor from an investment with a multitude of hidden costs regarding security and has helped point out contractual flaws that could have undermined the future of the investment.

USAID, Nethope, CIIP and Sentry

Our representatives Robert Shala and Drinor Selmanaj have become part of a regional project supported by USAID to perform a rapid needs assessment on behalf of Nethope and Civil Initiative for Internet Policy in several countries across Europe and Asia for key...

Raiffeisen Bank and Sentry

Sentry has established close collaboration with Raiffeisen Bank in Bosnia and Herzegovina to custom build and implement new bleeding-edge security solutions developed by the Sentry engineering team. Raiffeisen expects the new implementations to bring expanded...

Gemini and Sentry

The world of digital assets and cryptocurrencies is under constant pressure from cyber attacks - not too different from its traditional finance counterparts. During a business trip in New York, our Executive Director - Robert Shala and Chief Technology Officer -...

New York Stock Exchange and Sentry

Sentry representatives had the pleasure of visiting the trading floor of the legendary NYSE and observe the launch of a brand new IPO. While the times of a busy trading floor with lots of shouting, pushing, sweating are memorialized forever in Hollywood movies, the...

ICE and Sentry

Sentry representatives Robert Shala and Drinor Selmanaj have met with George Tull, the Head of Post/Pre Sales for ICE Data Services to discuss market manipulations in crypto exchanges stemming from cybersecurity attacks and cybersecurity-related incidents. AI...

Credit Suisse and Sentry

Sentry Executive Director - Robert Shala, has participated in the highly prestigious CFC conference held at St. Moritz alongside the former Secretary of Interior, Ryan Zinke. The conference brings together some of the sharpest minds in the governmental, financial, and...

CFC St. Moritz and Sentry

Sentry Executive Director - Robert Shala, has participated in the highly prestigious CFC conference held at St. Moritz alongside the former Secretary of Interior, Ryan Zinke. The conference brings together some of the sharpest minds in the governmental, financial, and...

Cyber Academy and Sentry

Sentry is excited to announce that three Cyber Academy students and two alumni have been invited to participate in a recent Penetration Engagement as technical consultants to the Sentry main offensive security force. Cyber Academy and Sentry will follow their close...

Cyberlance and Sentry

Sentry Engineers have been working in close collaboration with the Cyber Academy staff to build the most sophisticated cyber ranges tailor-made for educational institutions across the world. The cyberlance ranges have been built with the technical specifications...

Municipality of Sarajevo and Sentry

Sentry is thrilled to announce its collaboration with the Municipality of Sarajevo in implementing custom-built security solutions aimed at protecting critical citizen data and government network infrastructure. The Balkans is a particular crossroad for cyber-related...

Copyright 2019 Sentry
All Rights Reserved.

Website and Visuals crafted by Mayune.
Contact
+383 49 123123
[email protected]