Cybersecurity solutions

A company that provides cyber security around the world. Our solution has no analogues on the market, therefore having it you get a strategic advantage over your competitors or in the fight against hackers, terrorists and external enemies.

Cyber Security Audit

Prevents the cyber threat before it happened using patented methods.





Cyber Security Audit

A special hardware-software complex of wireless networks radio control. Intended for monitoring 2.4 GHz and 5 GHz frequencies and WiFi devices detection.

Guteberg product range

Сyber intelligence

Allows to get access to the routers, networks, computers, CCTV etc





Gate control with indicator exchange system

Visualization and analysis of data collected by WiFi monitor and remote access modules. Allows to located targets on the map

Internet/Social media control

Control of all incoming and outgoing internet traffic generated by users in the country. Save all user activity in the network. The ability to track a user in the country by his internet activity, to identify his location. Blocking/ replacing messages in any social network. Conducting investigations, analytics. Search and identification of intruders, hackers, terrorists.

INTRODUCTION

Guteberg company

Our company has more than 6 information protection and analysis technologies patents, licenses for information security evaluation and number of prestigious diplomas and awards. The company operates in accordance with ISO 27001: The International Information Security Standard.

Technological solutions available on the market provide protection against certain types of threats, but are not holistic and limited in their origin and functionality. Cyber and other threats are created by terrorists, enemy governments, rivals, hackers, activists and other attackers who are developing new ways to attack that are hard to foresee.

In order to predict and stop these threats at the initial stage our company has developed the Centurion hardware-software complex. Its main purpose is information protection of the state, conducting cyber-wars, intelligence activities, as well as total control of all Internet traffic and social networks within the country.

Our solution has no analogues on the market, therefore having it you get a strategic advantage over your competitors or in the fight against hackers, terrorists and external enemies.

Specially developed for providing a cyber wars and protecting national cyber security
Patented solutions at have not analogs

What makes us different

Ultimate flexibility - professional service for every budget. We carefully consider your needs. Unlike other companies, our pre-design documentation contains a comprehensive set of parameters. You know exactly what you are paying for. We have more than 20 years of experience in the industry, dozens of completed projects in over 25 countries and we constantly improve our methodologies.

It and information security experience - for decades we have gathered the most talented developers, analysts and specialists from all over the world.

Absolute reliability - we value our reputation, therefore we strictly comply with the laws and the code of ethics. We respect not only the rights and interests of our clients and partners, but also the legal rights and interests of third parties. Our professionals personally sign your commitment forms as if they were your employees.

Top quality - we use modern, comprehensive inventions and methodologies for developing, evaluating and managing it and security. We are attentive to the little things. In each project, we develop proposals for continuous improvement and monitor changes in the security of our customers around the clock.

Contact us

Our mission is

Protection     Investigation     Construction (reconstruction) of SOC

Assistance to government agencies in the search for intruders using Internet technologies

Protection

Analysis-detection-prevent. With using our own developments.


Investigation

Investigation of traces - identification of artifacts - analysis - identification of the intruder's reason


Construction (reconstruction) of SOC with modern requirements

Construction (reconstruction) is carried out by leading experts in the field of cyber defense with experience in conditions in cyber warfare.


We help government agencies in the search for intruders using Internet technologies

Internet fraud, sellers of illegal goods, cyberbullying, hackers, illegal drug trafficking, child pornography.

Our competence




There are different solutions for small, medium and large business (corporate). Options: rental, leasing, selling solutions.


Security solutions at the level of large companies and countries.


Application-specific solutions: WIFI ecosystem, traffic analysis, exchange of indicators of compromise for the industrial and public sectors, other products for industry solutions.


Application of own developments.


Practical work experience.



Contact us

Our field of activity



Small and Medium sized Enterprises (SME)

Aerospace & Defense

Banking and Financial institutions

Chemicals

Automotive

Education

Construction and development

Investigation

Oil refining industry

Gas industry

Electric power industry

Rail carrier

Educational programs for Top Managers

introductory course

Penetration testing and security analysis by a hacker (Introductory course BEFORE system delivery)

Main course for training specialists

Specialized course for system operators and operation of complexes. Training takes place during the installation and commissioning of the system.

Additional programs

Laboratory practice. Application of ethical hacking techniques (ITLv9). 40 hours. Exchange of experience and practices, knowledge. For advanced level