Analysis of integrity and penetration testing of computer networks, systems, applications and sites.24/7 security monitoring. We use a unique methodology worked out by us in numerous projects including the world's best practice. IS Audit reduces risk and allows you to check the effectiveness of the means of protection
Development and testing of security software and hardware systems, the development of analogues. Survey of the development and creation of proprietary counterparts often more profitable than the development of a new product from scratch. The product is deprotected or protected enough to lose its competitive advantage, reduces the company's profits. We do not allow this..MORE
Prompt investigation of cyber crime and security incidents. Gathering evidence and restore history information security incident. Our specialists work together with leading auditors and pentesters, to achieve maximum impact and effectiveness. We localize the problem, prevent damage, make an investigation..MORE
IT-infrastructure Penetration testing of companies through internet, a physical "pentest" using social engineering, physical "pentest" using hardware tracking, physical penetration inside the protected perimeter.
Numerous penetration testing of banks and ASV-scan within the PCI DSS, including foreign ones.
Penetration testing of several federal agencies and their offices in the country.
External and internal penetration testing major payment systems.
IS audit of internal and external networks of production enterprises.
Testing media sites, e-currency exchangers, entertainment and others.
IS Audit of distributed electronic document management system. Audit software, protocols and architecture.
The study of "Flame" in the investigation of the IS incident. "Flame" is a complex malware, which is widely used in some countries as cyber weapons.
The development of special software for corporate security for covert surveillance for employees.
Leading antivirus products drivers research for vulnerabilities.
Security analysis of cryptographic software, the company's market leader in enterprise encryption of traffic.
Commissioned by the US company we modified The low-end cell phones protection localization for Latin American markets. Research and development counterpart was conducted, phone localization and operator lock were made. The basis of the profit that nobody else in the world could copy our product.
The development of a previous project. The project team worked with George Hotz, known for hacking Iphone and Sony PS3. Creation of ultra-Orthodox Jews phones based on Samsung A157. Phone line with the approved set of religious requirements, for example - cannot send and receive SMS. Phone received official kosher certification from Rabbi of Israel. At the moment no one could copy solution. For sale in Israel and Germany.
Commissioned by the Chinese company was there was a research and a gsm-module firmware analogue on the base of Infineon E-Gold was developed. It Was also created a hardware-software system for testing and calibration of new modules. Production facilities are located in China.
Capture and digital X-rays card for screening equipment. Sharing protocols copied, component base completely changed and updated. Created testbed for emulation of X-ray sensors and control of electrical parameters of produced modules. The interface board is fully analogous to X-DAQ and requires no software modifications.
Investigation of abnormal activity in the corporate traffic.
Investigation of incidents of burglary and contamination of web-sites.
The investigation of focused and well-organized attacks using malicious ACT.
Forensic analysis of hard disks of the attacker, crypt-container autopsy.