← Anulum Institute
Security Solutions

Swiss compliance, real-world testing

We find vulnerabilities before attackers do. Security audits, penetration testing, hardening reviews, and incident response preparation — aligned with Swiss data protection law (revDSG/nLPD) and GDPR.

revDSG/GDPR alignedCode-level expertiseAI security assessment

The challenge

Swiss data protection law (revDSG/nLPD) applies since September 2023. Your systems must comply. Generic vulnerability scanners miss business logic flaws. You need someone who understands both the code and the regulatory landscape — and can test your defences as an attacker would. Our AI safety background (Director-AI prompt injection detection) gives us a unique edge in assessing AI-integrated systems.

What we deliver

Security Audit
Comprehensive review of web applications, APIs, and infrastructure. Configuration analysis, dependency audit, access control review.
Penetration Testing
Gray-box and black-box testing with detailed exploit reports. OWASP Top 10, API security, authentication bypass, privilege escalation.
Code Review
Security-focused review of application source code. Injection paths, cryptographic weaknesses, secret exposure, dependency vulnerabilities.
Hardening
OS, cloud, container, and network hardening to CIS benchmarks. Firewall rules, TLS configuration, least-privilege access.
Incident Response Prep
Playbooks, tabletop exercises, communication plans, and forensic readiness. Be prepared before you need it.
Compliance Mapping
revDSG/GDPR gap analysis and remediation roadmap. Data flow diagrams, consent management, breach notification procedures.

Pricing

Assessment
CHF 5'000
Single application or system. 2-3 day engagement.
  • Configuration review
  • Vulnerability report
  • Remediation guidance
  • 1-hour debrief call
Enquire
Comprehensive
CHF 35'000
Full organisation assessment + compliance mapping. 3-4 weeks.
  • Everything in Standard
  • Full revDSG/GDPR mapping
  • Incident response playbook
  • Tabletop exercise
  • Quarterly follow-up reviews
  • AI system security assessment
Contact us

How we work

Step 1
Scoping
Confidential intake call. Define attack surface and rules of engagement.
Step 2
Testing
Controlled assessment with daily status updates.
Step 3
Report
Executive summary + technical findings + risk ratings + remediation steps.
Step 4
Retest
Verify your fixes work. Included in Standard and Comprehensive.

Know your risks before they become incidents

Confidential scoping call. We will assess your attack surface and recommend the right level of engagement.

Schedule a confidential call