View

Sorting

Products found: 14

logo
Offer a reference bonus
0.00

achelos IoT

The Internet of Things is transforming how the world works, affecting markets and industries on a global scale. It represents the convergence of the virtual and the physical worlds by providing the interconnection between distributed device networks and data-oriented applications. These large, comprehensive and connected networks remain susceptible to security challenges. Any risk at a single point can endanger the entire system and lead to non-compliance and threats to data security, system integrity and service availability. IoT architecture Existing and emerging IoT concepts may differ in their approach, but they all share three basic domains: the devices, the network and the platform with related applications. Security of these domains should not be considered an afterthought. Using high-level cryptography it should be designed from the beginning as a fundamental element across any IoT deployment. At achelos IoT we understand that a secure system is the sum of many parts. Our solutions focus on three specific areas: compliance and robustness of communication channels, secure management of connectivity credentials and embedded high-security operating systems and applications. Secure connectivity management achelos IoT offers network operators, OEMs and large IoT service providers a GSMA-compliant, integrated solution for secure remote provisioning of mobile subscriptions for network authentication. The platform enables management of embedded SIMs (eSIM) and can similarly be used to manage traditional SIM cards, supported by purpose-built on-card applications. We can easily enable any customer interested in trying out the eSIM technology with an out-of-the-box deployment in AWS (Amazon Web Service). Our modular connectivity management components and their interoperability ensure that network growth, scalability and future releases and technology standards can easily be accommodated; from GSM, UMTS and LTE to 5G. Protocol compliance & robustness The Internet of Things is based on many new software developments. This requires security by design approach and a holistic view on security to support the authentication, authorization and privacy of data. Hence the data has to be protected along the whole value chain of IoT business models. TLS and IKE/IPsec are de-facto standards for secure networks with the aim of protecting data. Robust implementation and correct use of libraries are a major challenge with the variety of options being so extensive that loopholes for attackers easily arise during integration and later configuration. achelos IoT provides powerful test tools to find gaps and errors, safeguarding that network connections are secure according to well-established standards for different industries such as health, transportation and energy. Security consulting and services achelos supports customers to assess and to improve the security of their overall IoT system. The Service is based on the GSMA IoT Security Guidelines (CLP.12 for IoT Service Ecosystems and CLP.13 for IoT Endpoint Ecosystems) and the GSMA IoT Security Assessment Checklist (CLP.17). Embedded development At achelos IoT, we have developed a number of high security operating systems for the international market, using a variety of system architectures, IC’s and cryptographic libraries for both contact-based and contactless products. We provide various embedded simulations and test products to ensure that the quality requirements of our clients are fulfilled to the highest standard by executing module, integration and system testing. Based on our profound OS expertise, we are also a trusted partner when it comes to the development of applications for embedded systems covering a diverse set of market segments. IoT stakeholders Security of the IoT ecosystem relies upon the collaboration of a number of stakeholders throughout the lifecycle of all IoT assets: from planning and conception to design and development, and from testing through to operation and maintenance. The role of achelos IoT in this landscape is to provide the expertise to ensure the security of interrelated system elements. By establishing synergies from different stakeholders and value-adding partners, we work towards strengthening the end-to-end security of our clients’ IoT deployments.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
3
8
logo
Offer a reference bonus
0.00

AppSec Labs Internet of Things (IoT) Security

Smart and connected devices (IoT) are transforming our lives, improving efficiency, availability and security of our environment and life. Smart cities, smart medicine/healthcare, smart homes, smart transportation and smart manufacturing are changing the way we communicate with our environment, homes and even our bodies. AppSec Labs’ IoT Research and Evaluation Over the last few years we, at AppSec Labs, did a lot of research on connected device threats and mitigation. The research was done side-by-side with consulting and accompanying the development of new connected products and old-fashioned devices that became connected. We have helped teams develop secure solutions, and developed different tools and scripts to attack insecure usage and implementation. AppSec Labs IoT Partnerships AppSec Labs is a Microsoft Global trusted partner in the security program for Azure IoT, this partnership provides AppSec Labs with access to the newest Microsoft solutions and direct access to R&D, which is knowledge we transfer to our customers. Whether you’re building your own solution with certified devices or looking for a complete IoT solution, AppSec Labs can help tailor the Azure IoT Suite to your industry-specific needs. AppSec Labs has partnered up with leading IoT architects & development teams including Softimize and Emind. These partnerships allow us to stay one step ahead of the game and give us the opportunity to be in the first line with the best IoT providers – all the way from the designer table to production. Connected Device – the Ultimate Problem to Protect IoT products have two big issues that require wide and specialized expertise to secure: A larger attack surface:
  • Local device (sensors and/or controllers)
  • Mobile apps (iOS and Android)
  • Cloud APIs
  • Management website
Custom architectures and communications:
  • Multiple entities and identities
  • Multiple authentications in one product
  • Non-common protocols
  • Device initialization (network connection and pairing)
  • Mobile ⇔ device communication
  • Protecting client-side code (mobile apps and device)
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
5
logo
Offer a reference bonus
0.00

BDO Audit Services

An independent audit is the basis for decision-making by shareholders and investors on the capital market. Our main task - to strengthen the credibility of the financial statements of our customers. Audit Services
  • Audit of financial statements prepared in accordance with IFRS, GAAP USA and NAS of Ukraine. Additional value of our services lies in the fact that we make recommendations regarding confirmation of accuracy and reliability of financial and management information concerning the company’s management activity; financial control for business improvement
  • Audit of financial statements and maintenance of a company when going public (London Stock Exchange, German Stock Exchange, Warsaw Stock Exchange, Swiss Stock Exchange and others).
  • Preparation of an integrated report
Internal Audit
  • Estimation of state and optimization of the internal control system.
  • Organization of the Internal audit system.
  • Organization of the managerial control system.
Assistance to Finance Managers of Enterprises
  • Evaluation of change in the law effect on financial position and operating results of the company
  • Analysis of forming and change of statutory capital compliance with legislation requirements and local acts of the company
  • Bond issue consulting
  • Consulting on application of regulatory legal and other acts of public authorities (including the National Bank of Ukraine, Ukrainian Stock Exchange, and Ministry of Finance of Ukraine)
  • Consultations on the development and implementation of reporting methodology in accordance with IFRS
  • International audit
Specialized Reviews and Investigations
  • Reliability of accounts receivable and payable recognized in the accounting and reporting
  • Confirmation of the accuracy and reliability of financial and managerial information
  • Unification of the financial control system according to national and international financial reporting standards
Services for PSC on Financial Statements for the Securities Commission
  • Assistance in preparation of public joint stock companies financial statements, drawn up  in accordance with International Financial Reporting Standards for the provision of the State Commission on Securities and Stock Market.
  • Audit of financial statements of public corporations, prepared in accordance with National Regulations (Standards) of Accounting and IFRS for the provision to the State Commission on Securities and Stock Market.
Due Diligence Specialized agreed-upon procedures with respect to transactions undertaken express checks, purchase and sale of the business.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
20
19
logo
Offer a reference bonus
0.00

CIOneer BUSINESS SOLUTIONS

This product is suitable for Retail, Distributions
  • Business audit
  • Finance assessments & modeling
  • Supply Chain & modeling KPI
Duration 10+ days

Our customers get a number of measurable and non-measurable benefits:

  • Reducing IT TCO (total cost of ownership)
  • Maximizing the value of IT investments
  • Providing a holistic IT approach
  • Increasing the level of IT processes maturity
  • Making IT transparent and measurable
  • Managing IT risks
  • Building long-term business solutions based on the right technology

You need our services if:

  • Your investments in IT are not linked to company profit, savings or costs avoidance
  • Your IT does not speak business language
  • You do not have an answer to 2 or more questions below:
  1. What value in $ has IT delivered over the last 12 months?
  2. What was the TCO of your company during the last 3 years?
  3. When was the last IT customer survey conducted?
  4. How many IT tickets / incidents were reported last month?
  5. What is the ROI for the key IT projects?
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
12
7
logo
Offer a reference bonus
0.00

CIOneer BUSINESS TRANSFORMATION

This product is suitable for large businesses
  • Profit opportunities for the business
  • Correspondence between business and IT processes
  • Growth and optimization opportunities
  • IT innovations
Duration 7-14 days Our customers get a number of measurable and non-measurable benefits:
  • Reducing IT TCO (total cost of ownership)
  • Maximizing the value of IT investments
  • Providing a holistic IT approach
  • Increasing the level of IT processes maturity
  • Making IT transparent and measurable
  • Managing IT risks
  • Building long-term business solutions based on the right technology
You need our services if:
  • Your investments in IT are not linked to company profit, savings or costs avoidance
  • Your IT does not speak business language
  • You do not have an answer to 2 or more questions below:
  1. What value in $ has IT delivered over the last 12 months?
  2. What was the TCO of your company during the last 3 years?
  3. When was the last IT customer survey conducted?
  4. How many IT tickets / incidents were reported last month?
  5. What is the ROI for the key IT projects?
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
6
11
logo
Offer a reference bonus
0.00

CIOneer CIO as a service

This product is suitable for medium businesses
  • Building IT model
  • Management of IT
  • IT catalogue
  • IT structure
  • IT costs optimization
  • Development of customers head of IT
Duration 2-6 days/month

Our customers get a number of measurable and non-measurable benefits:

  • Reducing IT TCO (total cost of ownership)
  • Maximizing the value of IT investments
  • Providing a holistic IT approach
  • Increasing the level of IT processes maturity
  • Making IT transparent and measurable
  • Managing IT risks
  • Building long-term business solutions based on the right technology

You need our services if:

  • Your investments in IT are not linked to company profit, savings or costs avoidance
  • Your IT does not speak business language
  • You do not have an answer to 2 or more questions below:
  1. What value in $ has IT delivered over the last 12 months?
  2. What was the TCO of your company during the last 3 years?
  3. When was the last IT customer survey conducted?
  4. How many IT tickets / incidents were reported last month?
  5. What is the ROI for the key IT projects?
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
9
12
logo
Offer a reference bonus
0.00

CTP Digital Innovation Solutions

We specialize in building cloud-based software solutions that solve the most challenging problems today’s enterprises face. Whether it’s an IoT system that improves the reliability of locomotives or a big data analytics platform that predicts agricultural yields, the more complex and technology-intensive your project, the more we like working on it. CTP delivers a broad range of IoT consulting and implementation services that use the power of the cloud to solve today’s most challenging business problems. Cloud Native Development Build cloud-native software solutions that scales dynamically to meet your global business needs. Application Modernization Modernize your application for the cloud to improve performance, scalability and security. Big Data & Analytics Make better decisions by leveraging the power of the cloud to turn data into insights. New Tools & Technologies Stay ahead of the technology curve using Blockchain, Machine Learning and more.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
13
4
logo
Offer a reference bonus
0.00

Delve Risk Cybersecurity and Management Consulting

  •      Security Product & Strategic GTM Approach
Security and technology tools are being developed and created at a dizzying pace. The problem is that it’s getting harder and harder to grab the attention of decision making executives. Let delve Risk help by providing buy side executive insight into approaches, strategies and by giving feedback on your product/service.
  • Board of Advisor Empowerment
Most software and service companies have a board of advisors to help guide them. Nearly all fail to appropriately leverage that Board. Let Delve Risk help turn the BoA into an impact machine that will propel your decision making and results.
  • Executive Level Business Development
Relationships matter. It’s not about the relationships you have today though; but about the ones that are consistently being built and developed. Let Delve Risk help facilitate and empower business development at the senior executive level.
  • Executive Advantage
An engagement model focused on maximum flexibility to meet your needs. Advisors can be sounding boards, research channels, transformation agents, or even extra hands and feet in shaping your vision.
  • Strategic Security Roadmap & Assessment
Leverage and apply a wide range and breadth of technical expertise to help shape the roadmap, approach and target state of your program. It’s important to understand the current state of your ecosystem as fast as possible; company can help accelerate that.
  • Security Product Rationalization
Security and technology tools are often purchased to solve a specific need, but fail to maximize integration value between solutions. Delve can assist in shaping the approach to win market acquisition.
  • Technology Product & Solution Interface
With the vendor space on track to hit One million solution providers by 2027; there are just too many to keep up with; especially as a busy leader. Let Delve Risk help alleviate that; you tell their team the focus area and they will ensure you see providers that meet your criteria and expectations.


... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
10
14
logo
Offer a reference bonus
0.00

Kays Harbor Software Development

We Are A Software Development Company & We Love Solving Business Problems! Be it a new technology requirement or an existing IT project, at Kays Harbor, it is our prime objective to enable exceptional IT services for your business. We help you dominate your market by equipping your organization with the right technology toolsets. Robust software architectures should not be a challenge for you anymore as we build and maintain them on your behalf. While you aim to solve real-world challenges seamlessly; our team ensures the software you use aligns with your goal. Our Expertise From conceptualization to post-production, we offer web and mobile app development services for all your offshoring needs. We follow an agile and iterative development approach to build mobile-first, interactive technology solutions that solve your business pain points. Be it web experiences, custom mobile apps or enterprise integrations and customizations, explore our state-of-the-art technology expertise across multiple domains. Web Product Development Scalable, secure and feature-rich offshore web development for a powerful digital presence of your business. Healthcare Software Development Easy to use custom health tech solutions for super effective patient care. Mobile Application Development Native Android and iOS app development for everything mobile. Ecommerce Application Development Widen your business reach, cultivate loyalty and streamline operations through a custom-built online store for your brand. Enterprise Application Development Custom features in an existing product or integrating it with 3rd parties, we are experts in both. Independent Software Testing A suite of quality assurance and testing services mapped to your needs, no matter how big or small.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
20
9
logo
Offer a reference bonus
0.00

Pondurance Enterprise Security Testing

Assessing the security posture through Enterprise Security Testing is one of many the steps necessary to protecting the organizations information assets. With the advent of new technologies and inherent interconnectivity, an entire digital frontier has become unharnessed. With these great conveniences and efficiencies new challenges are presented that increase the complexity of protecting sensitive information before it ends up in the hands of an adversary.

Enterprise Security Testing Service Offerings:

Vulnerability Testing & Assessment – Vulnerability testing and assessments examine the underlying systems and resources that make up the infrastructure. Team searches for vulnerabilities and weaknesses that may put the enterprise environment at risk. The vulnerability assessment will provide an organization with the discovery, analysis, and controlled exploitation of security vulnerabilities that are accessible from external and internal sources. Identified vulnerabilities are validated through both manual and automated processes to eliminate false positive findings. Penetration Testing: Penetration tests help to truly quantify the impact of a real-world security incident or an attack against your environment. Leveraging the same tools and techniques as an attacker, penetration testing activities are performed to fully assess the effectiveness of the organization’s controls. Pondurance approaches penetration testing in a controlled manner by first coordinating with client personnel to identify the goals and objectives of the test, establishing rules of engagement, and expected end results. From an availability perspective denial-of-service (DoS) conditions are never intentionally pursued in penetration testing engagements. Finally, Pondurance consultants maintain constant communication via our secure portal so that everyone is aware of the activities as they unfold and are completed. Secure Configuration Review: Pondurance reviews operating systems and network devices for configuration settings that align with industry best practices and vendor-recommended guidelines. Security Architecture Review: This activity reviews a comprehensive list of the organization’s technical and strategic information security requirements, such as network design, access controls, environment assets, remote access, and monitoring, alerts, and reports of the underlying infrastructure. The architecture is then compared against best practices or requirements and any improvements or gaps are documented with recommendations to assist with alleviating the current risk. Physical Security Testing: This service penetrates the physical security of a targeted facility through the identification of gaps and/or weaknesses in the facility’s physical security controls. This service includes the manipulation of locks, identification systems, and entryways. Social Engineering: Social Engineering identifies gaps in your employee information security awareness training and pinpoints what changes to your business’s culture will need to be made to continue to conduct business in the modern world. Based on these needs, the following social engineering tests are available:
  • User Based: This uses various electronic communication mediums (email, telephone, social networking, etc.) to take advantage of the environment’s users in order to gain access to sensitive information or targeted data. Common scenarios include coordinated pre-texted calling scenarios and targeted email phishing campaigns.
  • Physical Based: A physical based social engineering test takes advantage of weaknesses in the physical security and your user’s security awareness training to attempt to gain unauthorized access to the facility and sensitive data assets.
Wireless Testing: Wireless testing provides examines security vulnerabilities and exposures within the targeted environment through the use of wireless radio analysis and configuration review. This service can target technology and implementation vulnerabilities, as well as user information security awareness.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
16
7
logo
Offer a reference bonus
0.00

Securicon Technical Consulting Services

Securicon helps customers seamlessly integrate and manage all of their Information Technology (IT) operations. Information security consultants are dedicated to securing our clients’ systems and networks, enabling compliance with applicable regulations, guidelines, and directives.
Consulting services  at Securicon are supported by a large group of skilled, highly-accomplished security professionals. These team members are driven to excel, constantly looking for new methodologies and techniques to help our customers prevail in the technical security arena. With decades of combined experience, the Securicon team has valuable insight into real-world strategies – which in turn ensures real-world success.


Comprehensive Security Services


The Securicon team includes both IT and Operational Technology (OT) engineers. These experts practice across a wide spectrum of professional security services, allowing experiences gained in one discipline to assist in solving problems in another.

Technical Consulting Services include:
  

  • Vulnerability Assessments – Identifying and prioritizing weak spots to protect mission-critical processes
  • Penetration Assessments – Figuring out where unauthorized access can occur and how it can happen
  • Security Architecture Review & Design – Establishing strategies with strong, effective security controls
  • Social Engineering Assessments – Highlighting weaknesses in internal training and procedures
  • Staff Augmentation – Enhancing our clients’ teams with Securicon expertise
... Learn more
-
ROI-calculator
Configurator
ROI-
-
15
16
logo
Offer a reference bonus
1.00

Teamvoy Software Development

Teamvoy is a custom software development company specializing in software product and application development and IT consulting. Our dedicated team consists of 30 experts, who care about customer's business. Our leading technical professionals have over 10 years of experience working with the clients towards successful product launches. We are located in Eastern Europe with an office in the West of Ukraine, Lviv, the second largest tech community. The city has more than 30k skilled IT professionals and two top-class universities with a big number of technical graduates per year. Our services: Web development Frontend + Backend. We have high-level web developers in our team to meet all clients needs and expectations. Our services can range from developing the simplest projects to the most complex web-based internet applications, electronic businesses and social network services. Teamvoy leverages cutting edge technologies like Ruby on Rails to build products a few times faster and reduce your time to market. Many other things that we know such as Relational databases, Proxy, Web and Application servers, Javascript ecosystem, CSS and HTML5 lead our customers’ projects to reliable, predictive and successful results. Mobile apps iOS + Android.  Whether you need to mobilize an existing mobile application, create a mobile extension to an existing system or a brand new mobile solution. Teamvoy has the skills and expertise to build and execute a mobile strategy. We offer Native App Development services for our clients. There are a number of advantages to writing apps in this way: they perform faster on the device, users can easily find and download apps of their choice from app store, offline work capabilities, access to the device’s hardware, such as its GPS sensor, contact list, camera, microphone, gyroscope, and accelerometer, as well as system software such as push notifications and other built-in system services. Cloud computing Our Cloud and Development Operations services focus on optimizing costs for client’s infrastructure support and availability to quickly extend their infrastructure. Teamvoy helps our clients to build scalable and secure infrastructure with IaaS for rapidly growing SaaS business model. Teamvoy’s certified engineers can help properly implement different solutions for migration from legacy on-premise infrastructure to the modern Cloud-based software. If you experiencing Performance problems with your current platform our experts will be glad to help you with Performance gap analysis and optimization. Whether you want to deploy to Amazon AWS, Heroku, DigitalOcean or other IaaS provider we ensure that you get all benefits.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
11
18
logo
Offer a reference bonus
0.00

ИТ-аудит by IT Solutions

ИТ-аудит (IT консалтинг) дает возможность оценить предоставляемую ИТ-инфраструктурой информацию по следующим семи критериям оценки:
  1. Эффективность – актуальность информации, соответствующего бизнес-процесса, гарантия своевременного и регулярного получения правильной информации.
  2. Продуктивность – обеспечение доступности информации с помощью оптимального (наиболее продуктивного и экономичного) использования ресурсов.
  3. Конфиденциальность – обеспечение защиты информации от неавторизованного ознакомления.
  4. Целостность – точность, полнота и достоверность информации в соответствии с требованиями бизнеса.
  5. Пригодность – предоставление информации по требованию бизнес-процессов.
  6. Согласованность – соответствие законам, правилам и договорным обязательствам.
  7. Надежность – доступ руководства организации к соответствующей информации для текущей деятельности, для создания финансовых отчетов и оценки степени соответствия.
Результаты ИТ-аудита позволяют:
  • Оценить соответствие ИС требованиям бизнеса, выявить недостатки и упущения
  • Эффективно планировать развитие ИС организации;
Принимать решения:
  • Обоснованно решать проблемы безопасности и контроля;
  • Обоснованно приобретать или модернизировать аппаратно-программные средства;
  • Планировать повышение квалификации сотрудников ИТ-подразделений.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
15
13
logo
Offer a reference bonus
0.00

УПРАВЛЯЕМАЯ БЕЗОПАСНОСТЬ

Мы занимаемся аудитами, оценкой, внедрением, сертификацией, обучением, мониторингом, расследованиями и восстановлением информационной безопасности организаций, сетей, приложений и веб-сайтов

УПРАВЛЯЕМАЯ БЕЗОПАСНОСТЬ

Внедрение ISO 27001, КСЗИ

Внедрение PCI DSS, GDPR

Внедрение VDA, TISAX

Удалённый менеджер безопасности

Тренинги и обучение

Тренинг для пентестеров

Управление рисками

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
16
16

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.