Request Form

Talk To Us

We Are Eager To Listen To Your Inquiry

Our dynamic Sales Team is available to attend to your inquiry. Please send us an email at sales@techyex.co and we shall respond at the earliest opportune time.

IT Audit & Cyber Security

Identity Access Management (IAM) including three-factor authentication (3FA) with our Global Partners, Security Audits, Network Security.

Security Assessment

We assess all processes from Penetration Testing, Application Security, Payment Systems Security, ICS Security, Transportation Systems Security, Smart Technologies and IoT Security to Red Teaming.

More

Security Assessment

Penetration Testing

A practical demonstration of possible attack scenarios allowing a malicious actor to bypass security controls in your corporate network and obtain high privileges in important systems.

Application Security Assessment

An in-depth hunt for business logic flaws and implementation vulnerabilities in applications of any kind, from large cloud-based solutions to embedded and mobile applications.

Payment Systems Security Assessment

Comprehensive analysis of the hardware and software components of various payment systems, revealing potential fraud scenarios and vulnerabilities that can result in financial transaction manipulation.

ICS Security Assessment

Case-specific threat modelling and vulnerability assessment of Industrial Control Systems and their components, providing an insight into your existing attack surface and the corresponding business impact of potential attacks.

Transportation Systems Security Assessment

Specialized research focused on identifying security problems related to mission-critical components of modern transportation infrastructure, from Automotive to Aerospace.

Smart Technologies and IoT Security Assessment

Detailed evaluation of highly-interconnected devices and their backend infrastructure, revealing vulnerabilities in firmware, network, and application layers.

Red Teaming

Threat Intelligence-driven adversary simulation helping to evaluate the effectiveness of your security monitoring capabilities and incident response procedures

Compromise Assessment

We assess all processes from Comprehensive analysis, Proactive mitigation, Incident Response, Digital Forensics to Malware Analysis.

More

Compromise Assessment

Comprehensive Analysis

Detects compromise attempts using a combination of approaches, including threat intelligence, vulnerability assessment and incident investigation

Proactive Mitigation

Timely identification of security incidents mitigates their impact before it becomes apparent and protects your resources from similar attacks in future

Incident Response

Covering the entire incident investigation cycle to completely eliminate the threat to your organization.

Digital Forensics

Analysis of the digital evidence relating to a cybercrime, leading to the creation of a comprehensive report detailing all relevant findings

Malware Analysis

Providing you with a complete picture of the behavior and functionality of specific malware files.

Cyber Security Training

We have certifications in Incident Response, Malware Analysis, Digital Forensics and Efficient Threat Detection with Yara among others.

More

Cyber Security Training

Incident Response

Courses will guide your in-house team through all of the stages of the incident response process and equip them with the comprehensive knowledge needed for successful incident remediation.

Malware Analysis

Courses provide the knowledge needed to analyze malicious software, to collect IoCs (Indicators of Compromise), to write signatures for detecting malware on infected machines, and to restore infected/encrypted files and documents.

Digital Forensics

Courses are designed to fill experience gaps - developing and enhancing practical skills in searching for digital cybercrime tracks and in analyzing different types of data for restoring attack timelines and sources.

Efficient Threat Detection with Yara

Participants will learn how to write the most effective Yara rules, how to test them and how to improve them to the point where they find threats that are undiscoverable by others.

Contact Us

Engage with us via the following.

Location:

AHA Towers, 4th Floor, Plot 7 Lourdel Road, Kampala

Contact Us On:

Phone: +256 701 154 587
WhatsApp: +256 754 694 634

We Are Open From:

Mon - Fri, 8:00 AM - 5:00 PM

Careers

Available Jobs