Home   |   About   |   Services   |   Consultancy   |   Domains   |   IT Security   |   Contact Us

Cyber Security and Information Operations and Information Assurance (IO/IA) are matters we take very seriously indeed. And so do our customers, from government to both listed and private companies. That’s why they trust us to deliver the end-to-end offensive and defensive solutions that successfully protect them from a wide range of internal and external threats including breach, fraud, theft and sabotage.


What’s involved


    - Vulnerability and Security Assessments

    Physical and Information Security Assessments, Software Vulnerability Testing, Penetration Testing Certification and Accreditation, and Compliance and Security Audits

    - Enterprise Information Assurance (IA) Solutions and Services

    Cross-Domain Information Sharing, Perimeter Defense, Public Key Infrastructure (PKI), Security Architectural Engineering and Systems Integration, and IA Training

    - Monitoring and Traffic Analysis

    Secure Voice/Video/Data Communications, Endpoint and Network Monitoring, Information Protection, Insider Threat Protection, and Real-Time Network Traffic Intelligence

    - Information Services

    Cryptographic Solutions, Vulnerability Exploitation, Computer Network Defense (CND), Computer Network Operations (CNO), and Open Source Exploitation

    - Information Operations (IO)

    Dynamic Defense, Reverse Engineering, IO Tools and Exploits, Tradecraft, Forensics and Incident Response


There are many paths to a cyber security career – and many types of people who are drawn to the field.

Home About Services IT Security Consulting Careers Contact Us
Phone: +263 242 496 456