DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. Originating at the research institute for fundamental and applied research in computer science, our code analysis technologies are now used in 24 countries around the world. At the present time, our team consists of 60 scientists and researchers. We strive to popularize R&D technology solutions in the field of SAST and DAST analysis.

Vision
DerSecur offers its customers high-quality solutions with maximum reliability and performance. Our commercial offers always consider the needs of customers and suggest a deep understanding of the tasks and challenges facing customers.
Key
Offering
Our key proposals relate to issues of cyber security and are intended for a wide range of users – from developers to top managers. We begin the work with a deep study of customer needs and end it with a detailed report. Our recommendations will help you focus resources on areas that could mitigate the greatest potential loss.

What We Do

As a cyber security and application security expert DerSecur provides cutting-edge technological tools and highly professional cyber security services.

DerScanner

DerScanner is our high-tech comprehensive application security solution that combines static (SAST) and dynamic (DAST) code analysis methods in a single interface. DerScanner allows to identify vulnerabilities and undocumented features in the code of mobile and web applications.

DerScanner is a unique tool that is able to analyze both source and binary code, is the world leader in the number of supported programming languages (36 languages) that can also understand polyglot applications and significantly reduces false positives with own Fuzzy Logic Engine patented technology.

Cyber Security Services

  • Penetration tests
Penetration testing is the best way to prove you are prepared to defend your assets from evolving threats and continuous attacks on your network and applications. DerSecur’s penetration testing offerings are all built from the attacker’s perspective, developing a strategy unique to your organization to achieve the goals of the engagement.
  • Code analysis
Traditional penetration tests often focus on exposure to threat actors with limited or absent prior information about the target system. This is appropriate in many cases, but reviewing the code is often a smart approach to maximize confidence. Checking the source code is recommended whenever higher levels of warranty are required.

Trusted by

Our Offices
  • Israel

    Haifa, Khuri 2
  • Spain

    Madrid, Paseo de la
    Castellana 200
  • Singapore

    8 Penjuru Ln.
  • Brazil

    San Paolo, 1437, Al. Itu, 141
  • UAE

    Abu Dhabi, 16-02 Office Tower, Capital Plaza
  • Republic of Kazakhstan

    Almaty, Musanbayeva 36
  • Republic of Kazakhstan

    Astana, Almaty street 1, office 202
  • Canada

    Ontario, Toronto, 16 Dallimore Circle Unit 818, M3C4C4
  • Israel

    Haifa, Khuri 2
  • Spain

    Madrid, Paseo de la
    Castellana 200
  • Singapore

    8 Penjuru Ln.
  • Brazil

    São Paulo, 1437, Al. Itu, 141
  • Azerbaijan

    Baku, S. Vurguna street 34, AF Mall, ap. 7
  • UAE

    Abu Dhabi, 16-02 Office Tower, Capital Plaza
  • Republic of Kazakhstan

    Almaty, Musanbayeva 36
  • Republic of Kazakhstan

    Astana, Almaty street 1, office 202
  • Canada

    Ontario, Toronto, 16 Dallimore Circle Unit 818, M3C4C4