You are on page 1of 3

General About US


• More than 200 secured customers in 40 countries worldwide
• 3 decades of experience in IT Security operations
• 7 days per week/ 24 hours of protection
• Partnerships with leading security companies worldwide
• Purpose-built Datacenter for managed security services with behavioral
analytics and incident response
• Guaranteed high level of security services covered by professional risk
insurance

Penetration and Stress Testing Services part of Risk and Vulnerability Management

• Penetration testing covers by case Black/ Grey/ White box approach for:
• • Network Infrastructure
• Web application
• Mobile applications (IOS and Android) • Internal and external infrastructure
• Wi-Fi networks
• Social Engineering
• Code reviews (manual or automated) • SCADA/ICS, IoT devices and cloud
• Stress test and/or DOS simulation technique
• Scan and exploit a wide variety of data center infrastructure and applications
vulnerabilities, following rules and real attack scenarios.
• Making recommendations on security weaknesses found and report all
activities and findings.
• Assist with fix up and remediation services for all identified vulnerabilities.
• Customized training and user’s awareness for Ethical Hacking, social
engineering and writing secure code for developer's environments
• Stress testing of web applications used to check the resilience of a service to
identify critical level of stress and/or effectiveness of denial-of- service
defense tools to real DOS attack

Incident Response Team & SOC Services

Analysis and Detection

• Smart data collection/detection


• Detect local anomalies
• Anomalies detection based on behavior patterns

Mitigation and Response

• Event management SOAR

• Integrated AI and ML Engines


• Contextual awareness and Impact Engine

• Cross domain correlation Shield Sensors

• SOC Management & incident response

ICS/SCADA Security services, Design and Drafting Services

• Cybersecurity SCADA/ICS audit and penetration testing services

• Complete system engineering services including consulting, project


management, design, drafting, logic programming, installation, commissioning
and support for PLC / DCS / HMI / IEC61850/ Modbus/ IEC-60870-5-104/
PRP / HSRP, Testing Protection Relays
• Historian solutions integration with Oracle, SAP or SQL database
• Proprietary Stratum 1 NTP Server Appliances micro-production

Independent R&D Lab for SCADA/ICS Cybersecurity

• Our private Cybersecurity Datacenter environment shows interactions


between cyber-initiated attacks and the physical SCADA/ICS world
• Datacenter contains devices, emulated or real, which communicate and
interact via ICS protocols
• Overall attack simulation can identify and highlight specific OT infrastructures,
protocols or applications vulnerabilities and expose any potential attack
surface
• R&D help us to practice and understand vulnerabilities behavior and
exploitable avenues, identify critical components on the control network and
model infrastructure interdependencies

Trainings - Let’s Go Back to school

• Security seen from an offensive perspective


• Security Classes for non-professionals
• Ethical Hacking – Contemporary Survival Kit IT Security Awareness – Social
engineering
• Tailored Professional Security Classes
• Security for WEB Developers
Cyber Security for SCADA/ICS
Information Security Advanced CISSP Bootcamp Training
Authorized Trainers essentials Security Training Organizations worldwide
such as EcCouncil, Offensive Security, ISC2
• International Classes
• Our trainers are recurrently invited as expert speakers at Security Days of
OWASP, the most prestigious IT Security Foundation Our experts are “labs
and content writers” for the official Offensive Security curricula
• Online Security Education Training and Awareness
OUR TEAM

Senior Security Information Consultants and IT Trainers with more than 20 years of IT
security, qualified as:

• OSCE (Offensive Security Certified Expert)


• OSWE (Offensive Security Web Expert )
• ECSA (EC-Council Certified Security Analyst)
• OSCP (Offensive Security Certified Professional)
• CEH (Certified Ethical Hacker)
• CRT (CREST Registered Penetration Tester)
• CPSA (CREST Practitioner Security Analyst)
• CHFI (Certified Hacking Forensics Investigator)
• CPTC/E (Certified Penetration Testing Consultant & Expert)
• CEI (Certified EC-Council Instructor) CEH & ECSA Trainer
• Industrial Control Systems Cyber Emergency Response team
• CISA Auditor and ISO 27001 Lead Auditor
• CRISC Certified in Risk and Information System Control
• BCMS Business Continuity Management System Auditor
• CCNA Security & CCNA
• CCNP (CISCO Certified Network Professional): Route/BSCI & Switching • Microsoft Certified
Technology Specialist: Microsoft Windows Server • CCAI (Cisco Certified Academy
Instructor)

You might also like