Products

VORTEX

The deployable package that collects everything toward its center.

Product Description

Technology has changed the way you do your business, allowing you to innovate and grow faster. But changing how you work and where you work changes the visibility and the threats you face.You need to focus on the critical network flows.

Looking for more information?

Download the product description and contact us!


Forensic Acquisition Toolkit

  • Intuitive touch panel allows for the switching of .ISOs on the fly. High compatibility.
  • Integrated encryption, virtual optical drive (ISO). Really useful to avoid carrying a ton of CD/DVDs during investigations.
  • Booting with the ISO image will help you to collect evidences and copy them to the same disk without touching the victim's machine.


Send us an email or complete the contact form to receive an offer!

Services

Cyber Security Services

Our experts can leverage their experience & expertise to help you improve your cyber security maturity. We can help you prepare for, detect and respond to cyber security incidents by delivering security assessments, improving your security monitoring capability and performing digital forensics investigations.

We provide also trainings in the following areas:

> ISO 27005 Risk Manager

> Network Forensic


Training

CDNF-01 Cyber Defence - Network Forensics

With this technical training the participants will familiarise themselves with the common methodologies and approaches on how the network forensic process could be conducted in practice. Students will work with packet capture files, analyse DDoS traces , and get familiar with countermeasures in order to better protect the network.

Duration: 1 day

Prerequisites: Laptop required for the lab sessions.

CDDF-01 Cyber Defence - Digital Forensics

With this technical training,  the students will learn the principles of digital forensics and evidence gathering.  Duration: 1 day

Prerequisites: Laptop required for the lab sessions.

CDCTI-01 Cyber Defence - Cyber Threat Intelligence

With this technical training,  the students will learn the collection, classification, and exploitation of knowledge about adversaries - collectively known as cyber threat intelligence . Responders need accurate, timely, and detailed information to monitor new and evolving attacks, as well as methods to exploit this information to put in place an improved defensive posture. 

Duration: 1 day

Prerequisites: Laptop required for the lab sessions.