About Us

OUR MISSION

Our mission is to provide information security services to home users,
home offices and small businesses in affordable and reasonable price.
Cyber security is not limited to big corporations.

OUR SLOGAN

We specialize in Information Security. Our slogans are
‘Think like a criminal and act as a professional’ and
‘While you do not know attack, how can you know about defence?’ as well as
‘Not only try harder but also try smarter!’

OUR COMPANY

We specialize in Information Security and provide cyber security services for home users,
home offices and small businesses in Hong Kong.

Members of our penetration testing team are certified with Offensive Security Certified Expert (OSCE),
Offensive Security Certified Professional (OSCP),
Offensive Security Web Assessor (OSWA),
Offensive Security Wireless Professional (OSWP),
GIAC Penetration Tester Certification (GPEN),
GIAC Web Application Penetration Tester (GWAPT),
CREST Registered Penetration Tester (CRT) and
CREST Practitioner Security Analyst (CPSA).

We also provide Linux servers hardening for security purpose, Intrusion Detection and Prevention System,
Web Application Firewall and Penetration Test.

Offensive Security Certified Expert Offensive Security Certified Professional Offensive Security Web Assessor Offensive Security Wireless Professional
Offensive Security Certified Expert (OSCE) Offensive Security Certified Professional (OSCP) Offensive Security Web Assessor (OSWA) Offensive Security Wireless Professional (OSWP)

OUR IDPS

Our Intrusion Detection and Prevention System (IDPS) is designed for Home users,
Home Offices and Small Businesses. The standout feature of our Intrusion Detection
and Prevention System compared to other similar products is its ability to confuse hackers.

For example, when a thief wants to break into a room, they usually enter through doors or windows.
But if the thief cannot find or see any doors or windows,
even though they actually exist, how can they break into the room?

Similarly, if hackers cannot find or see any points of intrusion,
even though they actually exist, how can they invade your computer or network?

This is a design concept that strikes at the source, and has been proven to be feasible,
reliable, and practical. It is highly effective in preventing hacker intrusions.

Best way to prevent hacking is to block the sources of attacks, such as malicious IP addresses,
domain names, and signatures of harmful files. Moreover, safeguarding the target against scanning
also enhances security measures.

OUR IDS

An intrusion detection system (IDS) is a security tool that monitors network or system activities for
malicious activities or policy violations and sends alerts when such activities are detected.
IDS can help organizations detect and respond to security incidents in a timely manner,
thereby increasing overall security posture.

Advantages of using an intrusion detection system include:

  1. Real-time threat detection: IDS can identify suspicious activities or patterns in real-time,
    allowing organizations to respond quickly to potential security threats.

  2. Enhanced security monitoring: IDS can provide continuous monitoring of network and
    system activities, helping organizations to identify and mitigate security risks.

  3. Regulatory compliance: Many industries and organizations are required to comply with
    specific security regulations. IDS can help organizations meet these requirements by
    monitoring and reporting security incidents.

OUR WAF

Our Web Application Firewall (WAF) intelligently blocks hackers’ intrusion with an extremely
low false-positive rate and effectively prevents zero-day vulnerability attacks,
protecting the security of the website.

OUR PENETRATION TEST

Penetration testing (or pentesting) is a security exercise where a cyber-security expert attempts to find
and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify
any weak spots in a system’s defenses which attackers could take advantage of.

This is like a bank hiring someone to dress as a burglar and try to break into their building
and gain access to the vault. If the ‘burglar’ succeeds and gets into the bank or the vault,
the bank will gain valuable information on how they need to tighten their security measures.

Don’t hesitate to contact us for demo.