Customized Research

 

i.s.c. will undertake any information security research task a customer chooses to asign to us. For example, we have created an encryption tool for BULL Corp. which is used for easy and secure transfer of audit reports.

Other examples include:

  • The technical entry examination for auditors' training class for CIS GmbH
  • The development of a 2-year forensics training program for King Fahad Security College
  • ISO 27001 compliance databases
  • Network monitoring tools
  • Conceptual work on IDS tools
  • Conceptual work on SIEM products and centralized logging solutions
  •