See other templatesSee other templates

×

Message

EU e-Privacy Directive

This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.

View e-Privacy Directive Documents

You have declined cookies. This decision can be reversed.

Tyr Data Security offers a wide variety of services and solutions in the data security & cyber intelligence field. Our focus is penetration testing (web applications, mobile apps, network infrastructures, network appliances and security architectures). We have conducted penetration testing for major clients from both the GRC and the private sector. We have 15 years of experience dealing with security issues in the Unix/Linux environment. We were part of the "Cyber security" world before it was even named "Cyber Security"! 


Tyr Data Security also deploy security solutions based on the client's needs and findings. We deploy software or hardware solutions (such as: IPS, IDS, W.A.F (web application firewall), "SQL firewalling", network firewalls, SElinux, DLP and several monitoring sensors). We specialize in open source solutions but we are also experienced with proprietary products.

Tyr also help firms with implementing a secure software development life cycle (S-SDLC). It's better to do code review and maintain a full S-SDLC process before releasing\launching your product! Catch the flaws before the hackers do! You can use our team for outsourcing specific tasks or as an "in house" team at your location. We will be happy to serve and assist you.

Tyr focus on:

  • Web application penetration testing (black box and white box approaches), S.A.A.S services, network infrastructures, firewall policies, W.A.F (web application firewall) analysis & bypassing, network appliances, etc.) code review for web applications and high risk software (also standalone c++ apps), general security consulting, management of secure SDLC processes. 

  • "0 Day exploits research" - Our experts will research your hardware or software product for "0 day" vulnerability. Finding "0 days" might be a long and complex process, but we have already helped one of the biggest corporations in the world with preventing 0 days in their product, so we would like to help your corporation get prepared for cyber attacks and zero days.

  • Android & Linux Embedded (also Smart TVs) penetration testing & security. We can help you manage the security of your custom devices, including smart TVs, mobile devices, home/office alarm systems and smart home systems (except pentest +). Alongside implementing security solutions, following you throughout the process, we can also create a bug bounty program for you and share it among the community.
  • Crypto currency backend penetration testing & general crypto security consulting - Related crypto SaaS services are at high risk. Alt coins, colored coins, it doesn't matter, all of these can be risky for your online business. Don't even take the risk! Let us examine your systems for vulnerabilities and other security issues before it's too late.

  • Intelligence - Tyr focus on 3 types of cyber intelligence: Corporate Competitive Intelligence, Low Level Due Diligence and threat intelligence. Threat intelligence involves gathering information from several sources, such as the Darknet and IRC channels, but we can also penetrate closed hacking groups and get the information you need. We speak Arabic and have amazing connections in the Arabic hacking world. We also sell intelligence about specific persons, just contact us and we will set up an encrypted voice call. Additionally, we can uncover commercial reputation management terrorists who might harm your corporation (or try to extort you).
    • General security consulting & specific crafted tasks - Tyr experts have more than 15 years of experience in the data security field. 
    • These days, when you can trust nobody, and even hardware manufacturers implement back doors (as a regulatory request), you must test your system for APT (advanced persisted threats) scenarios. We will help you to simulate, according to your budget, the scenarios for your needs and methods for reducing or preventing the damage from possible APT attacks.

 

Please contact us for more details and quotes!

Do you use a PGP-phone or other solution of encrypted voice communication? No problem. Simply email us keys and info.

Best Regards, 
Eran Aharoni
Chief Technical Officer & Founder

Customers Feedback

"This guy is an expert in web security"

“This guy is an expert in web security. He managed to fix a malicious issue on my server and also removed the spam that was sent from my server. He managed to complete this task after another provider failed and even gave me 15 days warranty! I recommend that you hire Eran if you are facing any web security issue.”

Drorcq, Israel

"Best freelancer I have hired so far!”

“I hired Eran to beef up my site security and improve its speed and my expectations were surpassed. If you need a security expert, look no further! Communication was perfect and you will get a kind person who puts in both time and effort. Best freelancer I have hired so far!”

Zachariah, New York

Free PDF about "ADOS & DDOS in 2015 - how to deal with both and the current market solutions

This is a FREE e-paper about ADOS (application denial of service attacks) and DDOS attacks on web application and service at 2015.

Free download

Emergency - GOT HACKED AND NEED HELP?

If you have been hacked and need emergency phone support, please call us for FREE. We will guide you through what to do and together we'll plan the next step in your crisis recovery!

 

GET A PRICE QUOTE NOW!

Interested in working together? Need a price quote to show to your finance dep? NO PROBLEM. Email us. Our management will take care of the rest and our tech guys will start hitting your servers! EMAIL NOW: This email address is being protected from spambots. You need JavaScript enabled to view it. Tell us what you need and we will take care of it ASAP!

 

Go to top