Our strong team has experience in building network monitoring solutions, analyzing network traffic, reverse engineering malware, responding to security incidents and hacking into networks by getting past even modern security defences.
We are independent and unbiased regarding products and know what works and what doesn't work when building or investing in IT-security.
By building and maturing a company's detection and response capabilities, it is possible to gain that upperhand in an already unbalanced fight.
We also have experience in testing various SCADA/ICS networks for vulnerabilities and know how these systems differentiate from corporate environments.
These are some of the specific services we can assist with.
- Planning and executing traditional Pentesting or Red Team exercises
- Testing SCADA/ICS environments for vulnerabilities
- Responding to incidents and help you understand how an attacker got past your defenses in case of a breach
- Analyzing malware samples by reverse engineering the code
- Building and maturing Security Operation Centers and Blue Teams
- Through digital forensics, we recover lost data and evidence