hacktive security - ethical hacking services
TRANSCRIPT
Make your future safestone by stone
Hacktive Security is a vendor independent security consulting c o m p a n y t h a t provides top quality s e r v i c e s i n t h e Information & Communication Technology filed. With an extensive range of services to ensure secure information systems the company operates into markets such as Telco, Finance, Insurance, Manufacturing, Education, and Government.
Hacktive security, your missing brick!
A S S E S S M E N TServices to ensure the integrity of information systems, against data theft and fraud.
D E T E C T I O NServices you need to be sure that you can detect any problem as soon as possible hence better fix it.
F O R E N S I CServices to identify and resolve incidents that can negatively impact your business.
P R O T E C T I O NServices to proactively manage your security risk.
R E S E A R C HInnovative services to develope solutions that gives added value.
T R A I N I N GCourses and workshops tailored to meet you necessities.
Hacktive Security is certified by UNI EN ISO 9001:2008 for meeting the quality management systems requirements defined by the International Organization for Standardization.
ExcellenceOur main competency is security assessments, however as our business has grown we now complement this ability with a wider range of security services thanks to our team of security experts and business partnerships. With Hacktive Security on board your company join a leading source for security services with depth of experience, expertise, and skill. Thanks to our clients we have a reputation of trust that they express with admiration and with continuous job orders.
Our CustomersHacktive Security’s customers are primarily medium and large enterprises from Italy.
WE PROVIDE THE FOLLOWING SERVICES
Team and Technical Expertise
The company is born from the vision acquired by two professionals with more than 10 years of international experience in the service of both civilian and military organizations. Hacktive Security's technical leaders are both individually widely recognized expert in the security field.
Mission
High security standards, the best reference methodologies, an innovative approach and a wide know-how on the cutting edge technologies are just some points on which Hacktive Security built its identity. Aiming to excellence to preserve and protect information is the first step toward our idea about security.
Attitude
Security changed from products focused on solving specific problems, to the design, support and implementation of a comprehensive, integrated solution. Hacktive Security's response to this challenge a structured approach, analyzing the scenario and risks involved, and then using this information to create a fully customized solution.
Commitment
➡ Provide services only around security➡ Understand your business risk➡ Help with compliance to legislation and regulations➡ Implement strong security solutions➡ Provide understandable results➡ Ethical, transparent and professional
Systems and Wired Networks - Web Applications -
Data Base Management Systems - SAP Systems
Wireless Networks
Wireless GSM/UMTS (2G/3G) Networks
Internal and External Intrusions
Mobile Technology (smartphones and tablets)
Source Code Analysis
Security Architecture Review
Security Awareness
Network Intrusion Detection Systems (NIDS)
Host based Intrusion Detection Systems (HIDS)
Security Information/Event Management (SIEM)
Advanced Persistent Threat (APT)
Incident Response and Digital Investigation
Malware Analysis
eDiscovery
Litigation Support - Expert Witness
Data Recovery
Internal Forensic LabSecurity Architecture Design & Review
Firewalls and VPNs
System and Network Devices Hardening
Network and Host Intrusion Prevention Systems
(NIPS/HIPS)
Wireless Networks Security
Database Security Hardening
Mobile Application Security
Backend Security Project (OWASP)
Hekidna System Protection
Security assessment courses
Forensic analysis courses
Hands-on security workshops
assessment
detection
forensic
protection
research
training
www . h a c k t i v e s e c u r i t y . c om