Applying breakthrough thinking to best protect your organization
Tailored Complementary Services
By engaging the hacker’s mindset into the services we provide, going the last mile by damaging equipment, and by providing services as an integral part of the holistic solution, CyberGym raises the level of cyber-security services beyond others in the industry. We offer a unique, broader perspective to existing and potential cyber events.
OSINT- Open Source Intelligence
CyberGym provides a comprehensive Open-source Intelligence service including data collection via human/ SIGINT/ communication and data mining in social media in upper forums/ blogs/ under forums & Darknet.
OSINT services can be provided ad-hoc, or as an ongoing service which is part of your overall defense plan. Our OSINT teams provide comprehensive reports and threat assessment as well as real-time, ongoing, protection to your organization.
CyberGym’s team members are all veterans of Israel’s defense forces and have a proven track record for trustworthiness and integrity. All services are white-hat in nature and follow the word and the spirit of the law.
CyberGym has a time-proven methodology for cyber security and information, standard and guideline-based, information risk assessment. CyberGym conducts Vulnerability tests and various attacks according the body of threats encountered by your organization, to identify weaknesses in organizations networks without actually compromising their systems.
CyberGym provides a comprehensive vulnerability report detailing vulnerabilities across your organization and proposing corrective actions.
Penetration tests (PT) aim to identify potential security vulnerabilities in your systems/assets to determine whether unauthorized access or other malicious activity is possible, and are designed to improve your organization’s security methods. CyberGym performs security evaluation of the IT/OT infrastructure by attempting to exploit vulnerabilities in operating systems, service and application flaws.
There are number of possible PT, each particular PT is performed according to the specific environment and organization.
Handling cyber events in real time both locally and remotely, CyberGym’s emergency response teams provide professional support for managing complex cyber events in real time.
Our teams specialize in responding to attacks on IT, production and ICS environments and widespread utilities systems. The response teams consist of control and operation engineers and ICS and cyber security experts. We perform a comprehensive assessment of your existing incident response capabilities, processes and tools and develop specific, cost-effective recommendations for improving your security posture such as: Incident response health checks, Incident response program development and Incident response training.
CyberGym offers a special service that allows customers to send suspicious files for analysis and receive a technical analysis report that will enable them to better understand whether their organization is under a cyber-attack and the threat level they face. Once a suspicious file is received, CyberGym provides an analysis report which provides malware's information such as: Indicators of Compromise(IOCs), capabilities and recommendations.
CyberGym trains Incident response teams who helps organizations contain and recover from security breaches and threats. A CSIRT responsibility is to protect and secure the critical assets of an organization, it supports the organizations critical processes and systems. CSIRTs may also provide proactive services which are not only helpful in preventing security incidents, but they also decrease the response time involved once an incident occurs. The goals of a CSIRT are based on the business goals of its organizations.
The hardest part of improving the organization’s security policy or implementing a new equipment on the organizational network is to test and examine the new product on the organization’s production environment.
CyberGym’s Cyber Training and Technologies Arena facilities can be used as a platform for examination and testing new products, procedures and security systems that the customer wishes to implement in their organization.
Using CyberGym’s Training Arena, you can understand the required preparations to implement the new product and its impact on the organizational environment.
CyberGym’s SOC aaS provides your organization with one of the most critical services in cyber security – real-time analyze of security data from different systems. Security information and event management (SIEM) systems are designed to provide a holistic view of the organization’s security status by detecting – in real-time – suspicious activities, unauthorized access, abnormal behavior or patterns and potential attacks. This is done by collecting, analyzing and correlating log messages from a variety of systems and devices in the organization.