Ballpoint

Our job, your security

We cover a wide technical scope, with specific tests foreach type of target


building skyscraper
icon server

Deep Protection

Application Security

We work on websites as well as on your APIs, heavy clients or mobile applications for example. Audits can be done in a white, gray or black box

icon files

Actual conditions

Redteam & Stress test

To test your security in depth and to assess the level of reaction of your SOC, we can carry out realistic end-to-end campaigns: from reconnaissance to proof of recovery of the most important data.

icon network

Critical infrastructure

Internal network

Evaluate the level of security of one of the most important building blocks of your IS: your internal network. Active directory, Azure, Office...

icon cloud

Hosted environments

Cloud Security

Taking an increasingly important part, we can support you on Cloud configuration audits: AWS, Azure, GCP or audits of your cloud applications.

icon forensic

Forensic

Incident response

Get help in the event of an intrusion into your network. Our experts can be mobilized quickly to analyze the threat, trace the attack and support you in your computer and legal procedures.

Your security doesn't have
to be a problem anymore

We take into account all of your expectations to advise you on the solution best suited to your needs. Security is a subject that every company, whatever its size, must integrate into its processes. We are here to advise you, test your implementation or your new projects in relation to current standards.

Methodology

Pentest methodology

Working with Ballpoint

As we have understood, the idea that security begins and ends end
with buying a pre-packaged firewall is simplyerroneous.

– Art Wittman