Many companies are looking for options to outsource software development and technological solutions abroad to increase quality and cost effectiveness. Poland has amazing potential when it comes to both. Find out why.
2. is doing things for the bigger
purpose than the sum of tasks
is prototyping solutions instead
of theoretical considerations
is transparency, openness and
honesty to the customer
Passion Innovation Trust
Our values
3. POLAND
is identified as a country
with the strongest
underlying fundamentals
to potentially outsource IT
solutions.
From the Center of Europe
4. STABLE ECONOMY
with a dynamically growing IT market
COST ATTRACTIVENESS
Why Poland?
EFFECTIVE COORDINATION
thanks to geographical proximity
CULTURAL SIMILARITIES
FAMOUS
Eastern - European school of programming
(great IT Universities)
5. 230experts in web and mobile
technologies
Member of SPCC – Scandinavian-Polish Chamber of Commerce since 2008
offices in major IT centresmastered technologies
years of experience per average
employee
years on the market client countries
19
20+ 3
10+ 6
Cybercom Poland strenghts
Our strenghts
6. Our Swedish roots combined with Polish
expertise and technical know-how guarantee
optimal results in delivering cutting edge
solutions.
While we use Swedish best practices to exceed
expectations and provide impeccable quality, we
maintain our Polish pricing and geeky attitude.
7. Accompanying our clients through every project
stage from early design to delivery, deployment,
and ongoing maintenance.
8. PROJECT BASED
end to end project management:
technical design, delivery and
deployment
RESOURCE BASED
our technical teams collaborate with your
project team
Custom collaboration
designdelivery
deployment
11. • nearshoring instead of outsourcing
• collocation and synergy effect
Software House
• open communication and transparency
• agile approach and iterations
12. Our core business in Software
House is to deliver superior
quality software in a timely
manner and continuously
improve teams’ velocity using
the scrum process.
1
2 3
4
56
ITERATIONS
24. Testing of data security and compliance with international and local laws and policies (PCI-DSS, personal
information security regulations etc.):
physical office/infrastructure security testing
dumpster-diving
office security policies review
Data Security & Compliance
IT infrastructure security (WiFi,
access to servers and routers, etc.)
social engineering
25. Mobile Apps Security
Static and dynamic analysis of mobile applications security,
including:
sensitive data
transmission (MITM
attack)
local data storage
(file formats,
encryption etc.)
user authentication
and authorization
methods
tampering with UI
or settings
testing against
known server-side
web application
risks (OWASP)
source-code
analysis
reverse-
engineering
deassembly
26. Black/Grey/White testing of:
Web Applications Security
incorrect handling of
temporary files on the user
side (i.e. cookies)
improper storage and
transmission of data
ActiveX and Adobe Flash
components decompilation
and deobfuscation
brute-forcing and
dictionary attacks
captcha security
password-reverting
functionality security
buffer/stack overflows incorrect error handling
code
decompiling/deassembly/d
eobfuscation/unpacking
tampering with UI, settings
and registry
anti-piracy (user
registration, trial version
limitations etc.)
localization issues
pentesting against known attacks (SQL injection, command injection, XSS, LCI, RCI, CSRF, directory traversal, MITM and
all other from OWASP list)
28. We discover and develop OPPORTUNITIES for you and with you
Increased revenue
Reduced operational
expenses
Increased differentiantion
Data discovery and insight
Streamlined customer
services
Reduced risk Regulatory compliance
Connected brand strategy
Increased security
IoT Strategies for Diversified Business
30. "They listen to their customers well. Whenever we have
a problem, they make an effort to solve it together with
us, without being pushy."
— Technology Director at CompoSIDE
"They [Cybercom] are reliable, especially when initiating
new projects or activities. When we request a specific
resource to be delivered at a given time, I can be 100%
sure that it will happen."
— Manager
"Cybercom has been very good to work with, analyzing
and coming up with new suggestions on how we could
modernize this system into a more test-friendly system."