ALTALSEC

Clean Cyber Solutions

Services

Tailor made Security plans

Generic placeholder image

Security Assessment

Best Practices Review – Risk Assessment - where is the Organization weak, from the Information Security point of view? What are the Gaps which a Cyber-criminal will take advantage of? Are you open to Social Engineering attacks, web attacks, etc. Are the 3 rd party software and service agreements which you work with concerned with Information Security? What regulations should your enterprise be in compliance with? Do you know?

Generic placeholder image

Penetration Testing

Vulnerability Assessment / Network Penetration Test to assure system durability against any kind of attack. Our attack team will adapt special attacks and specific methodologies in order to reach a successful and accurate security assessment of Net-A-Porter network design and implementation. Among the researched network devices, we will carefully examine an attacker's ability to penetrate and manipulate the various network components.

Generic placeholder image

Forensics

Our company provides inspection and analysis services for private and business computers, open and closed networks, network equipment, and searches for past intrusion attempts. The company also provides data recovery services, copying and preservation of evidence, and an analysis of system logs in order to get a precise snapshot of the different uses made on the system in the specific test time period.

Generic placeholder image

Cyber Training

We offer advanced courses on cyber security, web intelligence, information gathering techniques, discovery of malicious software on WIN, Linux, Unix operating systems, spyware and back-doors detection, and forensics investigations.

Generic placeholder image

Cyber Courses

The training sessions aim is to increase individuals awareness on all information security aspects. We offer training on Information Security Incident response, Information Security defensive methodologies, attack perspective covered with real world stories.

Generic placeholder image

Consulting

Cyber Events

Cyber Trainings

Security awareness training is an important part of fighting Cyber crime. The presentations and resources on this page will provide you with information to help keep your computer and information secure.

Courses Catalog Send Request

CYEYE

CYEyE

One of the ways to protect your digital Intellectual Property is to use a proactive approach. Is it possible? only if you use automation to identify attacks  and leaked information before its too late. CYEyE platform monitors a broad range of internet data sources categorized in three dimensions:

  • Network ---> Reconnaissance
  • Human ---> Social Media
  • Cyber ---> Cyber Criminal activity

| Private (Leaked) Databases | Darknet Monitoring | Social Media | News Feed | Telegram | Whatsapp | Social Video Monitoring | Twitter Monitoring | Blog Monitoring | YouTube Monitoring | Pastes Monitoring | Darknet Monitoring | IRC Monitoring | Malware Monitoring.

View Details Send Request

OSINT Platform

YCS developed a platform that provides creative solutions for complex cyber needs of Individuals, companies and organizations.

  • Discover information on Cyber-attacks which are expected to take place against a defined entity, and / or expose information on an attack which has already been carried out by sending real time notifications.
  • The system identifies relevant defined information  from all Internet resources available, accessible and underground.
  • Assets evaluation including weak points that can help increase efficiency and safety and protect your systems.
  • Data collection and 24/7 Social Network monitoring and data collection customized according to your needs, executed by an automated system that detects the relevant keywords

CYEYE

OSINT Platform

Get Live Updates

Cyber news regarding tools, vulnerabilities, exploits, techniques

Subscribe to our Newsletter

>

About

Since 2008

US

ALTAL Security is an expert group providing a wide range of information security services based on particular expertise in three main fields: Telecom security, forensic security and investigations of Cyber threats. ALTAL Security was founded by top Cyber security experts and embraces a holistic approach.

Expertise

Our experts are familiar with the underground hacking forums and are regularly monitoring the entire web for keywords relevant to our customers, we alert our customers of any relevant information found in these forums and blogs.

Experience

Europe, Middle East, U.S, North America

Telecommunication, Banks, Governmental Offices, Police, Luxary and more.

Flexibility

We believe we can provide any form of security service needed. Tailor made Security plans and training taking into account your organization needs.

Contact Us

Office Location

ISRAEL, TLV
Phone: +972-5-4-5-7-7-9-9-6-9
http://t.me/altalsec

Social