The team of Black Cell Llc. consists of people who are interested in innovative information technologies, and committed to the protection of information values.
The mission of the team is to help customers to build and sustain long-term IT, ICT security, furthermore spread the importance of securing information.
Our goal is to provide multiple, personalized, but integrated solutions for small, medium sized businesses and enterprises in order to exploiting the potentials of security. We offer only products which ensure the biggest advantage possible for the users, therefore we continuously seeking for new, innovative technologies. Using competent and effective solutions which can be originated from our experiences, our employees’ knowledge and the cooperation with our customers, allows us to support our clients’ success.
The key of our customer-driven thinking is to be available to our clients, whether if it is giving information, support or consulting.
Cybersecurity Consulting
These consulting services are based on maturity level determination and the principle of necessity and proportionality. Realistic view about the existing cybersecurity exposure of the organization. Sparing unnecessary expenditure. Preparing for the worst possible scenario. Creating sustainable cybersecurity systems.
Managed Security Services Provider
Black cell offers customers its own customizable Managed Security Services (Hereinafter MSS). Support is available: 8 hours / 5 days. 24 hours / 7 days. Support is offered in English and Hungarian. Black Cell’s Technical Support Team will respond to and resolve customer submitted problems related to the Product installation, administration and operation in accordance with the Service Level Agreements [SLA], described in this document, in order to: Answer general questions not addressed in the Documentation. Address issues resulting from Product not functioning as described in the Documentation. Provide help and guidance regarding the threat detection. Provide help and guidance regarding extended policy configuration and customer filter optimization.
Penetration Testing
After a detailed inspection of the target system our professionals exploit the identified vulnerabilities to ensure attacker: into what depths could infiltrate the system, what data could acquire, whether could execute a malicious code, open a backdoor and thus create a persistent threat being present, regarding the above what would be the scale of the attack one could effectuate?
Security Operations & Incident Response
Our company’s SOC-as-a-Service package is specifically designed for infrastructures over 500 IPs. Whether it’s protecting a critical infrastructure or complex enterprise, government environment, our incident response team has specialized experience to provide for our clients. The primary mission of the SOC is to prevent, detect and handle cyber security incidents. Accordingly, many preventive controls should be implemented during the design phase to reveal and eliminate known attack paths. Blind spots are eliminated by a variety of technical and logical solutions, so detection capabilities will be more efficient, faster, and the time needed to investigate events will minimized.
Social Engineering
In the course of social engineering, an attacker strives to access the systems through the employees and the information they possess. The two vectors of the attack are aimed at exploiting basic human nature, including the use of helpfulness/empathy and conflict avoidance. No matter how advanced the security of a system is, if the information security awareness of the users is inadequate, the degree of protection is significantly reduced. Social engineering measures the degree of ‘maturity’ of employees and physical protection. As a result of the investigation, you will get a comprehensive picture of your employees’ information security awareness, the state of physical and logical protection, and the level of adequacy of incident management.