PROJECT MANAGEMENT UAV ASSESSMENTS & MONITORING
By providing services in unmanned aerial vehicles (UAV), we provide drones, pilots and sensing technology that allow usto deliver tailored and complete solutions to our clients in any environment.
Our strong team of skilled pilots, experienced data analysts andinnovative technology experts can support you in meeting the most challenging of needs.
The great benefits of today’s interconnected world go hand-in-hand with the threats and vulnerabilities of storing, sharing and accessing our data such as abuse by criminal elements, theft, fraud, blackmail or other illegal activities.
Services provided include:
CYBER SECURITY ASSESSMENTS
A check of security of system, applications, networks against potential attacks from external (internet) or internal environment.
Using the Open Web Application Security Project (OWASP) methodology of testing guide, Open Source Security Testing Methodology Manual (OSSTMM) and others, the following can be audited to find bottlenecks and potential improvements relating to cyber security:
Many of today’s hacks, frauds and leaks are caused by (often unintentional) misbehaviour of your network users and employees. Knowing how to protect your data, connection, communication, the simple and common DO’s and DONT’s are the subjects of Cyber Secured Behaviour Training that makes sure the most volatile component of your network – the human factor – doesn’t negate the implemented technological security measures of your operations.
Early Warning – observation of an early occurrence of targeted attack on specific organisations (configurations of malware programs are followed, and it is investigated if our clients are not targeted) – in case of an attack, the client receives an extensive report from our analysts
Sample submission – the option to check uploaded file in available database to determine if it’s malware (in case something appears in an IT infrastructure and the client cannot assess the threat) – the client receives an analysis report
Data feeds – providing data about botnets pulled from all recently tested samples of selected families of damaging code and thus to provide information on managing servers (which direct the damaging code), list of servers where the damaging code is present and list of potential targets. This information is used for existing SIEM solutions, or as a source of black lists directly to inhibit the communication with unwanted objects.
Whether it be a coincidental or direct attack (by malicious code – virus), an investigation is performed to determine the following: Whether or not it was a targeted attack, when and where was the point of entry, what was the inflicted damage on the IT infrastructure, the root cause and what are the further potential areas of reach. The output is a detailed analysis describing the above, recommendations for eliminating further spread or fixing the infected devices and mitigating future risks.