Nearly every organization, business and even institution in the world today needs a website. It enables easy interaction and effective communication with people from anywhere in the world. Websites are crucial in global business today, although institutions have many benefits from having a website, websites are prone to security risks. Web application security refers to steps taken to safeguard data of users. Websites and web applications are vulnerable to being attacked by hackers and confidential information are at risk of being hacked if cogent measures are not taken to secure data. For businesses to optimize their online presence, there’s a need for websites to remain functional round the clock. This enables people from different parts of the world to have unlimited access to carry out their transactions without any restrictions. The risks associated with websites remaining functional round the clock means websites run uninterrupted and large data is generated many times. This makes them a prime target for hackers and data miners. When hackers are able to gain access to a web application, vital information of customers are available to them.

Over the years, there have been numerous cases of compromised websites of businesses, organizations and even government agencies.  The security of web application is now a great concern in the IT world, so it is essential that effective arrangement must be put in place to avoid data breaches. In order to curb this menace, several web security companies are springing up every day. But sadly, they are either too expensive or their solutions are not efficient. At Xieles Support, our job is to make sure that web applications and websites are safe and free from exploits. We are experts and have developed solutions to keeps websites safe from threats or attacks. We adopt preventive methods to prevent breaches and attacks. Through detailed review and careful analysis, at Xieles Support, we determine the vulnerability of web applications, identify the weak links and rectify them to prevent any attack.

Our range of services includes:

  • Web Application Security Testing

  • Web Application Security Assessment

  • Web Application Threat Modelling

  • Web Application Penetration Test


Cross-site scripting and SQL (XSS) are common errors caused by defects in codes and untidy input and output of web applications. In 2012, a phishing threat caused a total loss of $1.5 billion.

To prevent such attacks, adequate security measures should be taken to ensure data integrity. Such measures should be adhered to throughout the lifespan of the development. We ensure your web applications adhere strictly to global standards from inception to launching.

Our solution also protects web applications from all threats as categorized by OWASP.  According to OWASP (Open Web Application Security Project) an emerging global body for web application security, there are Ten (10) major threats against web applications worldwide. They are

  1. Cross-site scripting (XSS)
  2. Denial of service (DoS)
  3. Insecure configuration management
  4. Insecure storage
  5. Improper error handling
  6. Buffer overflow
  7. Broken authentication and session management
  8. Broken access control
  9. Injection flaws
  10. Invalidated input.

Xieles Support utilizes tailored solutions to detect and fix all loopholes in web applications, by performing tests and review on websites, loopholes can be fixed before they are exploited by hackers. We have seasoned experts in web security who will carry out a comprehensive review on your applications, point out the vulnerabilities, fix them and give you a detailed report containing among other things, the best practices to adopt against threats and attacks.

A constant web application testing carried out by our experts will shield your applications from attacks and fortify your web security.


Web Application Security Assessments are designed to identify threats to organizations, fix the loopholes and provide recommendations based on global best practices. Our solutions are designed and customized around well-known global standard guides in web application security assessment.

One of such guide is the Open Source Security Testing Methodology Manual (OSSTMM). The OSSTMM is a globally accepted manual on web security assessment and analysis based on verified facts. Rather of making web application security assessment a mystery, the OSSTMM has simplified the process which allows repeatability, consistency, and quality assurance on all assessments.

The key aspects covered by the OSSTMM are

  1. Security Analysis
  2. Operational Security Metrics
  3. Trust Analysis
  4. Work Flow
  5. Telecommunication Security Testing
  6. Wireless Security Testing
  7. Data Networks Security Testing
  8. Compliance
  9. Reporting with the STAR
  10. The Mobius defense

At Xieles Support, our solutions cover Internet security analysis, communications security, wireless security and physical security amongst others which are in accordance with OSSTMM standards.


Web Application Threat Modelling deals with identification of threats to businesses that emanate from software applications designed by such businesses. These threats have damaging effects on businesses. According to securityintelligence.com, SQL injections, a type of web application attack, was responsible for 8.1 percent of all data breaches worldwide in 2014.

To prevent further occurrence, Xieles Support adopts the globally accepted threat modelling standard approach by STRIDE and DREAD.

STRIDE is a classification scheme that characterizes known threats according to the intention of the attacker.

STRIDE stands for

  • S – Spoofing identity
  • T – Tampering with data
  • R – Repudiation
  • I – Information disclosure
  • D – Denial of service
  • E – Elevation of privilege

STRIDE is generally used for identification and classification of threats to web applications.

DREAD is a classification scheme that quantifies, compares and prioritizes the amount of risk by each threat.

DREAD stand for

  • D – Damage potential
  • R – Reproducibility
  • E – Exploitability
  • A – Affected users
  • D – Discoverability

When carrying out web application threat modelling based on DREAD, the result produced is between 0 to 10. The higher the number, the more serious the risk.


Web application penetration tests analyses loop holes in web applications and proffers solutions for stability of the web application. Hackers and data miners are constantly seeking for loopholes in applications to explore. According to WAAR – Web Application Attack Report – 6.5 million passwords was stolen from Linkedin.com in June 2012, while 11 million hashed passwords and 8.2 million email addresses were stolen from Gamigon in July 2012.

Our experts take utmost care while carrying out these tests to prevent loss of critical information from your applications. Our solution adopts diverse penetration testing techniques which are but not restricted to

  • Physical security penetration tests
  • Stolen equipment penetration tests
  • Cryptanalysis attack
  • Shrink wrapped software penetration tests.

With Xieles Support, the security of your web applications is in safe hands.