Retesting several vulnerabilities found in a previously executed penetration test, in the EZWim system in order to ascertain that these vulnerabilities have been resolved sufficiently.
Executing a full penetration test of the EZWim platform, including the authorization model, in order to validate the secure development practices of the development teams.