WiFi monitoring and audit soft&hardware.
- Active and passive devices identification
- Activity control
- Broadcast requests collecting
- Device's known networks identification
- Handshakes collecting
Geoserver
- WiFi monitors signal's based data mapping
- Cloned WiFi devices detecting
- WiFi devices tracking
- Detection of vulnerable WiFi devices
Centurion WiFi
- Vihecle/stationary based WiFi monitor hardware maintaining
- MAC clones monitoring
- Traffic dumping
- Securing perimeter control
Antifraude
- Banking/financial systems, payments/blockchain/in-game processing
- Filters and lists to check each transaction
- Automated and manual control
- Standard and unique rules
Security Awareness
- Government and corporate security awareness programs
- Education about security policies and procedures for employees
- Continuity of Operations (COOP) and IT Disaster Planning
- Step by step policies for security threats discovered
- COOP Architecture Design and Implementation Services
Secure network space
- Architeting the secured networks
- Maintaining security awareness systems
- Penetration testing
BYOD Security
- Alarming unknown devices network connections
- Monitoring own devices activities
- BYOD access control
- Activities evidence collecting
- Detecting and blocking unusual activities
IT infrastructure penetration testing service description.
- Black Box Penetration Testing
- White Box Penetration Testing
- IT infrastructure security audit
- Third-party risk monitoring
Forensic
- Technical support for cybercrime investigation and analysis
- Network Forensics
- Disk Forensics
- Internet Forensics
Contacts
- Address: 27 Bulvarno-Kudriavska str., Kiev, Ukraine
- phones: +38(067)352 00 00, +38(067)797 92 31
- Email: ap@itlab.name