1. Services

2. Technology

3. Education


1. Boardroom Training

Teaching directors about cybersecurity

2. Cryptography

Art of writing or solving codes


3. Counter Terrorism

Designing political/activities to prevent/ thwart terrorism

4. Continuity/ Disaster Recovery Planning

Documenting a structured approach with instructions for responding to unplanned incidents

5. Cloud Hosting

Outsourcing client's computing/ storage resources to a service provider that offers its infrastructure services (IaaS)

6. Computer/ Cyber Law Advisory

Advising on legal system dealings with the Internet, cyberspace, and their respective legal issues

7. Cracking/ Deciphering

Converting (a text written in code, or a coded signal) into normal, understandable language

8. Data Integrity Analysis

Judging overall completeness, accuracy and consistency of data

9. Data Classification

Sorting and categorizing data into various types, forms or any other distinct class

10. Deep VAPT (using OWASP)

Vulnerability assessing and penetration testing (using Open Web Application Security Project)

11. Digital Forensics

Recovering and investigating material found in digital devices, often in relation to computer crime

12. DNS Monitoring

Testing via network monitoring tools connectivity between authoritative name servers and local recursive servers

13. Incident Response Management

Addressing/ managing the aftermath of a security breach or cyberattack to limit damage

14. ISO/ ITIL/ PCI DSS/ COBIT Compliance

Ensuring state of being in accordance with established global guidelines or specifications

15. IT Audit and Reporting

Examining/ evaluating an organization's information technology infrastructure, policies and operations 

16. IT/ OT Best Practices

Prescribing commercial/ professional procedures which are accepted as being correct or most effective

17. IT Governance

Ensuring the effective and efficient use of IT in enabling an organization to achieve its goals

18. IT Planning

Strategizing how a client enables its IT infrastructure/portfolio to operate/ function in line with its business objectives

19. Initial Checkups and Remediation

Cooperatively carrying out initial work prior to a comprehensive VAPT

20. Lawful Black Hat/ Offensive Security

Proactive/ adversarial approach to protect computer systems/ networks/ individuals from attacks 

21. Lawful Bootstrapper/ Kernel Hooking

Configuring most basic core of OS that handles resource allocation/ file management/ security

22. Lawful Interception

Art of receiving electronic transmissions before they reach the intended recipient

23. Malware Analysis and New Rules/ Heuristics Addition

Determining the functionality/ origin/ potential impact of a given malware sample

24. Performance Testing

Evaluating of the quality or capability of a product or solution

25. Proprietary Penetration Testing

Our own unique methodologies used for exploiting vulnerabilities

26. Protocol and Kernel Forensics

Investigating the most core of a OS for damages (often for repairs) after an event

27. Privilege Administration

Assigning user rights and privileges to the users of a system or network

28. Regression Testing

Testing to confirm that a recent program or code change has not adversely affected existing features

29. Remote IT Strategy Implementation

Trying to carry out our services without visiting the client's office site

30. Signals Testing

Using sophisticated instruments to detect signals over a period of time, and to identify and report findings 

31. Secure Data Transmission

Securely transmitting/ transferring data such as confidential/ proprietary information over our secure channel

32. Secure Configuration (especially, SELinux)

Configuring the OS and security settings of the client to offer maximum protection/ security

33. Troubleshooting/ Rectification/ Debugging

Supporting the client to remedy any technical difficulties 

34. Virtualisation based OS Security

Leveraging advanced virtualisation technology to avert dangers our clients can face

35. Web Application Security

Checking the security of websites, web applications and web services

36. Web/ Network/ System Cyber Defence Review

Reviewing application security of our clients


1. Anti Exfiltration/ Anti Data Leakage

Security tools to defend against data loss and leakage.

2. Anti Spam/ Phishing

Services and solutions that focus on blocking and mitigating the effects of illegal emails – or spam – on email users.

3. Counter Espionage

Actions to prevent another country or company from discovering its security, industrial, or political secrets.

4. Cyber Intelligence Services

Information on new trends of cyber attacks or methodologies.

(1) Medsec

(2) White-Hat

(3) Clearsky

(4) Terrogence

(5) Cyberhat

5. DDOS Solutions (Products, Services)

Techniques or tools to mitigate impact of distributed denial-of-service (DDoS) attacks on networks by protecting the relay networks.

(1) Radware

(2) F5

(3) Reblaze

(4) Encapsula

(5) Arbor

(6) McAfee

(7) Paloalto


(9) Fortinet

(10) CheckPoint

(11) Akamai

6. Data Traffic Inspected Routing

Deep packet inspection (DPI) is a form of filtering used to inspect data packets sent from one computer to another over a network.

7. Database Integration/ Management System

A database which acts as the data store for multiple applications, and thus integrates data across these applications 

8. Database (DBMS) Firewalls

(1) McAfee Centrigo

(2) Imperva

(3) IBM Guardium

(4) Oracle

9. Document/ Data Sanitization/ Filtering

This is either we destroy data so it's irrecoverable, or we disassemble, dissect, neutralise threats, reconstruct and deliver safe files.

(1) Sasa

(2) Resec

(3) Votiro

(4) YazamTech

(5) Opswat

(6) Odix

10. Data Loss Prevention/ Protection (DLP)

The practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data or archival. 

(1) Forcepoint

(2) McAfee

(3) Symantec 

(4) Microsoft (Secure Islands)

(5) Trendmicro

(6) Minereye 

11. Endpoint Protection Platform (EPP)

Solution on endpoint devices to prevent file-based malware attacks, detect malicious activity, and provide respond to security incidents.

(1) McAfee

(2) Trendmicro 

(3) Symantec 

(4) Kaspersky

(5) Checkpoint

(6) Eset


12. Enterprise Job Scheduling (Open)

View and manage all scheduled jobs or processes across multiple platforms.

(1) BMC (Control-M)

(2) Automic (UC4-CA)

(3) IBM

13. Enterprise System Management Frameworks

Manage the entire enterprise's technology systems across multiple platforms.

(1) BMC HP

(2) IBM CA

(3) Microsoft

(4) Solarwinds

(5) Centerity

(6) AppDynamics (CISCO)

(7) DynaTrace

(8) ManageEngine

(9) TriggerPlus

14. General Enterprise DC Networking

Communications backbone which connect computers and related devices across departments + workgroup networks, facilitating insight.


(2) HP

(3) Arista Networks

(4) Nokia (Alcatel Lucent)

(5) Dell
(6) Juniper

(7) Mellanox

15. Enterprise Resource Planning/ CRM/ HRM

 Integrated management of main business processes, often in real-time and mediated by software and technology.

16. Extraction, Transforming and Loading (ETL)

Procedure of copying data from one or more sources into a destination system which represents the data differently.

(1) Informatica 

(2) Microsoft

(3) IBM


(5) Oracle

17. Enterprise Encryptors

Encrypt the data of the enterprise.

18. Enterprise Storage

Storing solutions.



(3) HDS

(4) HP

(5) IBM

(6) Infindat

(7) NimbleStorage (HP)

(8) Oracle

19. Email Security

Email security.

(1) CISCO Iron Port

(2) Forcepoint

(3) PineApp

(4) Symantec

(5) Fortinet

(6) Proofpoint

(7) Checkpoint

20. Enterprise Backup

Backing up software for companies.

(1) Commvault

(2) Veritas

(3) EMC


(5) Arcserve

(6) IBM

(7) Actifio 

(8) HP Rubrick

21. Enterprise Virtual Local Area Network

A way to mitigate external threats for an enterprise.


22. Firewall

Network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. 

(1) Checkpoint

(2) Paloalto

(3) Fortinet

(4) Juniper


23. All Flash Array

Solid-state storage disk system, is an external storage array that uses only flash media for persistent storage.

(1) Kaminario 

(2) EMC


(4) HP 

(5) HDS

(6) IBM Nimble (HP)

24. Honeypot/Deception

A honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods.

(1) Trap X

(2) Illusive Networks

(3) Guardicore

(4) Cymmetria

(5) Penror 7

25. ICS^2 (SCADA Control Systems)

Technology to protect control systems.

26. Network Tapping/ Visibility

Being aware of all the devices in the network.

(1) Gigamon

(2) IXIA (Keysight) 

(3) CGS

(4) VSS (Netscout) 

27. Network Access Control

Unify endpoint security technology, user or system authentication and network security enforcement.

(1) Portnox

(2) Forescout

(3) CISCO 

28. Network Security Policy Management

Principles, procedures and guidelines to enforce, manage, monitor and maintain security on a computer network.

(1) Tufin 

(2) Algosec

(3) Skybox

(4) CheckPoint

(5) Firemon

29. Mobile Device Protection

Protecting devices from malware threats to reducing risks and securing mobile devices and their data in the case of theft, loss, etc. 

(1) VMware

(2) Mobile Iron

(3) Blackberry

(4) CheckPoint

(5) IBM

(6) Microsoft

(7) Citrix


(9) Ivanti (Let Mobile)

30. Sandboxing

Isolates applications from critical system resources and other programs to stop harmful applications from negatively affecting your system.

(1) CheckPoint

(2) Trendmicro

(3) Forcepoint

(4) McAfee

(5) Fortinet

(6) FireEye

(7) Symantec

(8) Paloalto

(9) Open Source (Cuckoo)

(10) CISCO

(11) Vx Stream

31. Scramblers

Devices which encode or disrupt the signals for security purposes.

32. Secure Data

Protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites.

(1) Cyber Ark

(2) Safe-T

(3) Infobay

33. Security Awareness

Knowledge + attitude of an organization regarding the protection of the physical, and especially informational, assets of that organization.

(1) Iron Scales

(2) Cyber Ready

(3) Dcoya

(4) Celestya Q-log

(5) Phishme

34. Security Information Event Management (SIEM)

Products which provide real-time analysis of security alerts generated by applications and network hardware.

(1) HP (Microfocus) 

(2) IBM

(3) McAfee

(4) RSA

(5) Splunk

(6) Alienvault

35. Secure Virtual Private Network

A safe and encrypted connection over a less secure network

36. Servers

Computer or computer program which manages access to a centralized resource or service in a network.

(1) HP

(2) Dell


(4) Lenovo  

37. Service Desk

A communications center that provides a single point of contact between a company and its customers, employees and business partners. 

(1) BMC Service Now

(2) Sysaid

(3) CA Microsoft via XRM

(4) Manage Engine

(5) Jira (as SD)

(6) SAP

(7) HP

(8) IBM

38. TOR based Network Anonymizers

We set up and try to use TOR to anonymize network traffic.

39. Web Security

Products which secure confidential data stored online from unauthorized access and modification.

(1) Forcepoint

(2) Symantec

(3) Checkpoint

(4) Paloalto

(5) Fortinet

(6) McAfee


40. Web Application Firewalls

Protects web applications by monitoring and filtering traffic.

(1) F5

(2) Imperva

(3) Radware

(4) Reblaze

(5) Encapsula 

(6) Barracuda

(7) A10


It is possible to learn this industry well by studying the information found on the internet.