Immunity will often be engaged to review multiple systems handling anything from detailed authentication transactions through to complex financial data infrastructures with multiple back-end processing applications and storage systems. A review of the entire infrastructure and the way it processes the data is necessary in order to identify potential weak points. This is then usually followed with a more detailed application or source code analysis.