The Challenge
- The client had recurring processes that access the same or similar data
- Produce comparable results
- The client used different excel sheets without good sharing between each actor
The Approach
- Providing a security assessment tool to bundle similar threats and assessments and reuse them
- Implementation of a security process application which supports the search of threats, vulnerabilities and risks of an internet service
- To allow access for several users and a collaboration, but also guarantee restrictive access the application for different departments and services the application is developed in Spring.io and is deployed in a Docker container
- Always providing same results reports improving interpretation and usability
Result & Added Value
- Application is running for different departments in its own Docker container
- Core components can be shared between different instances
- Application can adapt the view part to different displays – responsive view
- The backend is implemented in Spring.io and can deploy independent of the Angular view
- Security issues can be identified and documented
Related Projects
Our Competencies
With INVENSITY by your side, you have access to our wide scope of competencies, in-depth knowledge, and our highly skilled and experienced team of consultants.





