Once you register with a valid company name and official email, you will be introduced with you account manager. Your account manager will familiarise you with the Prolabs dashboard and the team, who will be working with you to provide the premium service that you require from us. Through this process, SAST will often find issues like buffer overflows and memory leaks, along with more complicated vulnerabilities like SQL injection issues and cross-site scripting issues.
Once you are logged in, you can directly upload an app for an audit. A dashboard is present to display the information regarding all the uploaded apps and contains the information regarding the type of Audit, date uploaded and the status of the file.
Testing application with only one form of testing tool leaves residual risk. Apps should be tested with both techniques to yield the most comprehensive testing.
Once the Vulnerability is patched, you can change the patching status accordingly from your end. After completion of all the necessary tests or checks on the particular URL and depending upon the user requirement, the status shall be closed and your app will be ready to be deployed.
The report that Recon provided us with was very useful. Although, we haven't acted on it yet but we do appreciate your efforts in compiling this report. We are looking to have a long and strong relation with Recon.
I would like to convey our sincere thanks to Recon for your kind support in carrying out cyber audit of HAMRAAZ IT infrastructure which enabled its smooth uninterrupted and secure functioning over NIC cloud. With your constant security guidelines, the Appln is successfully providing the intended services to serving soldiers of Indian Army.