Language: PL/EN/DE/FR

Security Tests

Do you know that your company is a potential target for cybercriminals?

We know how to ensure your safety. We will help you to protect your resources quickly and effectively.

Companies which have trusted us

  • Noble Bank
  • OTTO praca
  • PKP-Informatyka
  • Meritum Bank
  • Kruk
  • Politechnika Wrocławska
  • Serwis Prawa
  • Politechnika Śląska
  • Net Team Solutions
  • Unit4Teta
  • Neuca
  • Uniwersytet Ekonomiczny we Wrocławiu
  • Norauto
  • Viessman
  • Grupa Energa
  • Meritum Bank

How can we help you?

Each day, thousands of enterprises are attacked by cybercriminals. Our mission is to protect your company from real financial losses. With over 10 years of experience, we provide services in the area of IT security, which is our greatest passion. Our portfolio includes security tests of websites and mobile applications, penetration tests, security audits, source code audits, computer forensics as well as trainings.

Web Security

If you manage a website, an online shop or a corporate portal, you are a potential target for attacks. Intruders will try to impersonate your website, block it or even steal data, which means a risk of customer loss, turnover decrease and, last but not least, damage to your image which is difficult to rebuild.

In order to protect your website, we will check its resistance to attacks. We have tools and skills which will give you information about any irregularities, and will help you to eliminate errors. With us, you can be sure that your website will function effectively.

Whether you use proprietary solutions or out-of-the-box applications like Wordpress, Joomla or Drupal, your website is in danger. Do not wait until cybercriminals steal your data – contact us in order to receive an individual offer.

Penetration Tests

We will carry out a controlled attack on your company’s resources in order to find and protect vulnerable points. Our tests are conducted after detailed arrangements defining the scope of analyzed infrastructure, test duration and allowed activities. We use the following methodologies: OWASP, OSSTMM, NIST – extended based on many years of experience.

A planned attack is the best way to check the security status. You can wait for cybercriminals aiming at theft and devastation, or hire a professional company to gain valuable data – the choice is yours. Contact us to receive information about possible scenarios of attacks targeted at your company.

Security Audits

We check the legal compliance of IT system security measures at your company. We help companies to develop and implement the IT Security Management System and prepare for the ISO/IEC 27001 certification or PCI DSS standard process.

We will analyze the compliance of your personal data protection measures with the requirements of the Personal Data Protection Act and the Act on Inspector General for Personal Data Protection and check the physical measures protecting your IT solutions. If you are interested in a controlled attack on your company’s resources, check out our penetration tests offer. Contact us to receive more information.

Mobile applications

The growing popularity of mobile devices such as smartphones and tablets as well as an immense growth in the number of applications for such platforms result in new threats related to information protection.

To minimize the risk of an attack with the use of mobile technologies, we carefully test and verify the applied solutions, searching for vulnerabilities which may affect the security of programs dedicated for Android, iOS (iPad/iPhone), Symbian or Windows Phone platforms. Contact us in order to check your mobile application’s security level.

Source Code Audits

By auditing the source code of any application, we will detect a greater number of vulnerabilities than during conventional blackbox tests, and thus we will make your solutions more secure.

What distinguishes us from typical teams of auditors is an extensive programming experience gained during a wide range of projects. We have developed software for embedded devices, websites, databases and many others. During audits we use tools for dynamic and static analysis, which enables us to increase the service effectiveness. Our contribution into increasing the security level of Open Source software is the best proof of our qualifications in this field. Please contact us to receive a detailed offer adjusted to your solutions.

Computer Forensics

If you’ve already fallen victim to computer crime, we offer our experience in the field of computer forensics. We will find all traces left to determine the type and scope of the intrusion, and tell you where the intruder was and what kind of information was acquired.


In every system, the human factor is always the weakest link. To effectively prevent information leaks in your company, it is crucial to educate and caution the employees. Our training contains practical exercises to inform the participants about current threats, and how to recognize and eliminate them. This approach makes it possible to avoid problems already at the initial stage of an attack aimed at your resources.

Who are we?

We believe that the digital world may be a secure place. That is why we have participated in security projects for over 10 years. At industry conferences (e.g. Secure, Confidence, OWASP, Internet Banking Security, SecureCon) we warn against digital threats, and by means of our blog we have educated people how to use the Internet more safely for many years. We have practical experience in carrying out security tests at financial, telecommunications and government institutions.

We help to maintain the security of Open Source software, operating at millions of computers around the world. As specialists on the global IT security market, court experts, specialist in risk management and authors of alerts and opinion-forming articles, we know how to ensure your safety.

For more information, see the detailed profiles of our basic team: Borys Łącki, Mateusz Kocielski.

Our Customers and References

We have fulfilled many orders for both private and public entities.
We are proud that financial, governmental, corporate and social institutions are present in our portfolio. We conduct research and share the results on worldwide IT security expert newsgroups.

  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x
  • x



Dąbrowskiego 23/9
50-457 Wrocław, PL Zobacz na mapie

+48 71 738 24 35
+48 601 86 14 85

Contact us:

By sending the query, you agree to receive the offer of LogicalTrust pursuant to Art. 3.2 of the Act on Rendering Electronic Services (Journal of Laws 2002.144.1204).