| Ref. Code: | EM-1 |
|---|---|
| Objective | To prepare the framework for securing Mobile Devices, Applications and Sensitive Data that is stored on Mobile Devices |
| What we do | Phase 1
Phase 2
Phase 3
|
| Requirements |
|
| What you get | Security Assessment Reports:
|
| Suggested frequency |
|
| Ref. Code: | EM-2 |
|---|---|
| Objective | To identify the security issues related to storage and transmission of sensitive data and flaws in business logic of Mobile Applications |
| What we do |
|
| Requirements |
|
| What you get | Security Assessment Reports:
|
| Suggested frequency |
|
| Ref. Code: | EM-3 |
|---|---|
| Objective | To identify syntax errors, configuration issues and flaws in the business logic that occurs in the application codes, which may result in a compromised application. |
| What we do |
|
| Requirements |
|
| What you get | Security Assessment Reports:
|
| Suggested frequency |
|




