Welcome To Tyr Data Security !
Penetrations Testings & Security Consulting since 2009 !
We have more than 10 years of experience performing web application penetration tests, both on Microsoft solutions and on every possible Linux flavor or Unix O.S. We also offer code review services, W.A.F installations, consulting and much more. Contact us now.
Android & Linux Embedded penetration testing & security - we can help you manage the security of your custom devices, including smart TV's, mobile devices, home/office alarm systems and Smart home systems. We have extensive "hands on experience" with Smart TV's in particular and have worked for one of the biggest corporations in the world. We are sure we will be able to help you.
"0 Day exploit research" - Our experts will search your hardware or software product for "0 day" vulnerabilities. Finding "0 days" might be a long and complex process, but we have already helped one of the biggest corporations in the world to prevent 0 days in their product, so we would like to help your corporation to get prepared for cyber attacks and zero days.
Tyr Data Security offers a wide variety of services and solutions in the data security & cyber intelligence field. Our focus is penetration testing (web applications, mobile apps, network infrastructures, network appliances and security architectures). We have conducted penetration testing for major clients from both the GRC and the private sector. We have 15 years of experience dealing with security issues in the Unix/Linux environment. We were part of the "Cyber security" world before it was even named "Cyber Security"!
Tyr Data Security also deploy security solutions based on the client's needs and findings. We deploy software or hardware solutions (such as: IPS, IDS, W.A.F (web application firewall), "SQL firewalling", network firewalls, SElinux, DLP and several monitoring sensors). We specialize in open source solutions but we are also experienced with proprietary products.
Tyr also help firms with implementing a secure software development life cycle (S-SDLC). It's better to do code review and maintain a full S-SDLC process before releasing\launching your product! Catch the flaws before the hackers do! You can use our team for outsourcing specific tasks or as an "in house" team at your location. We will be happy to serve and assist you.
Tyr focus on:
Please contact us for more details and quotes!
Do you use a PGP-phone or other solution of encrypted voice communication? No problem. Simply email us keys and info.
Chief Technical Officer & Founder