Security

  • Methods for filtering objectionable content

    Research and development of effective metods for the detection and filtration of objectionable content in network traffic (Deep-Packet Inspection, etc.).
  • Penetration testing of IS

    Ethical hacking for error lookup in information systems with subsequent penetration based on the custromer's demands.
  • Physical security and Electronic Security Systems (ESS)

    Design of systems for technical, organizational and regime measures to prevent unauthorized use, demage, destruction or theft of tangible and intangible property or to provide human safety measures.
  • Physical security and Electronic Security Systems (ESS)

    Design of systems for technical, organizational and regime measures to prevent unauthorized use, demage, destruction or theft of tangible and intangible property or to provide human safety measures.
  • Protection and sharing confidential data

    Research and development of methods for sharing encrypted or modyfied confidential data (e.g. network topology, network traffic records) among multiple entities and performing operations on them (e.g. search).
  • Immunity testing and protection against DoS and DDoS attacks.

    Tests on up to 10 Gbps flow, analysis, modeling and recognition of patterns of DoS and DDoS attacks in a network. Research and testing of new methods for the protection of key equipment in the network (e.g. SIP server).
  • Security of broadcast and multicast communication

    Analysis, design and implementation of security mechanisms for conventional telephone exchanges and soft-PBX.
  • Security of telecommunication devices

    Analysis, design and implementation of security mechanisms for conventional telephony exchanges and soft-PBX.