Security Solutions

Security Solutions
Protect Your Applications and Network.

1Cyber offers a variety of services from information security consulting to assessing, testing and improving the protection of applications and networks for companies operating in healthcare, manufacturing, banking, retail, telecommunications, and other industries.

Our security experts develop a personal approach to each customer based on best practices and enriched with our own experience. We are ready to support our clients at all project stages.

Let us help you today.

Let Technology give your Business that Competitive Edge.

Cybersecurity Services

We offer our customers a variety of cybersecurity services to:

  • Significantly reduce the number of security weaknesses in web, mobile, and desktop applications, as well as in our clients’ networks.
  • Ensure their constant compliance with appropriate regulations and standards (PCI DSS, GDPR, HIPAA).


  • Security code review
  • Mobile device
    management and
    mobile application
  • Cloud security
  • Web application

Security Assessment
and Planning

  • Information security
  • Security testing of IT
    infrastructures and its
  • Stress testing: emulation of
    DDoS / DoS attacks

Network DMZ

  • SIEM
  • DDoS protection
  • Email security
  • Firewalls, IDS / IPS
  • DLP implementation
    and setting
  • Antivirus protection

Application Security

Poorly coded and insufficiently protected applications can put a company at risk and result in data breaches. 1Cyber offers their skills and knowledge in assessing and testing the security of applications (web, mobile, desktop), as well as finding ways to help their customers to achieve the effective protection of the corporate data stored locally or remotely.

Each programming language has its quirks that may cause security flaws during the development phase. 1Cyber security experts detect existing loopholes before your applications ‘go live.’

Our security engineers conduct automated and manual security code review and engage senior developers and architects (if needed) to help you to:

  • Detect mistakes introduced into an application during its development to improve software quality and increase its protection level.
  • Highlight weak points in the source code of your app where vulnerabilities may potentially occur.
  • Find the most cost-efficient ways to eliminate security weaknesses identified in applications.

With the proliferation of mobile devices, mobile applications and programs used within corporate networks, enterprises face the need to manage and secure their usage. 1Cyber offers their expertise in applying the appropriate device management policies and implementing control measures to the installation of new mobile apps.

Our security testing team has a wide experience in correctly installing and tuning mobile device management (MDM) and mobile application management (MAM) solutions like Microsoft Intune to ensure mobile security. We can fine-tune mobile security services you choose to apply and set the necessary policies properly for you to:

  • Ensure the compliance of devices (both corporate and personal) and applications with your internal security policies and requirements.
  • Control how your employees exploit and share corporate information via their mobile devices and the apps they use.

1Cyber helps their customers to secure their cloud solutions. Being a Microsoft Business Partner, we have the necessary experience to tune special security components, such as Azure Security Center, allowing security management and threat protection across cloud workloads.

1Cyber security engineers can apply appropriate cloud security measures and configure cloud protection solutions to ensure:

  • Constant and efficient monitoring of the security of your cloud applications.
  • Analysis of the event logs from your cloud solutions and prompt detection of suspicious activities.
  • Remediation of security weaknesses potentially existing in your cloud environment.
  • Application of the necessary security policies to make your cloud solutions meet the appropriate security standards.

1Cyber’s security experts ensure proper protection of a website, a web app, or web services.

  • Our security testing team carries out vulnerability assessment to check whether the proper encryption, authentication and other security measures are applied in a web app, a web service or a website.
  • Upon the evaluation results, our security engineers provide customers with valuable recommendations on how to improve the protection level of their web solutions.
  • We offer penetration testing services (as a one-time or a regular service) to provide customers with the detailed information on real security threats they may face and identify the most critical security weaknesses to let our customers prioritize remediation measures and apply necessary security patches.

Security Assessment and Planning


1Cyber delivers full-scale security assessment and planning services for the components of IT infrastructures:

  • Web, mobile, desktop applications.
  • Network services.
  • Remote access software.
  • IoT devices.
  • Employee behavior.
  • Client side.

We help our customers to identify their security risks and define the measures to mitigate the risks by offering our competencies in the areas listed below.

Our security experts will consult you on the possible ways of monitoring the robustness of your cyberenvironment against security threats, detecting vulnerabilities in your network or apps, improving the performance of your information security solutions, and ensuring the protection of your sensitive data.

We uncover security loopholes in the components of our customers’ IT environments. 1Cyber security team carefully checks the protection level of your IT infrastructure and defines measures to reduce the number of security weaknesses inside your network and apps.

The complex of security testing services includes:

Infrastructure security audit

Our security team assesses your IT infrastructure to identify vulnerabilities in the following areas:

  • Security policies and procedures.
  • Security monitoring tools.
  • Physical access control.
  • Configuration management.
  • Version control.

Compliance testing

Our security engineers perform automated and manual scanning of your IT environment and its elements to ensure your compliance with PCI DSS, HIPAA, and other regulations and standards. On the basis of the testing results, the security team provides you with a detailed attestation letter.

Vulnerability assessment

1Cyber performs automated and manual security evaluation to detect vulnerabilities in their customers’ IT infrastructures. Our security testing team identifies, quantifies, and ranks network security weaknesses. Based on the assessment results, we give our customers recommendations to help them to eliminate security risks.

Penetration Testing

1Cyber security testing team pinpoints system vulnerabilities, validates existing security measures, and provides a detailed remediation roadmap. Equipped with the special tools and industry-specific test scenarios, the team performs penetration testing according to one of the three approaches:

  • Black box testing. We work in life-like conditions having strictly limited knowledge on your network and no information on the security policies, network structure, software and network protection used.
  • Grey box testing. We examine your system having some information on your network, such as user login details, architecture diagrams or the network’s overview.
  • White box testing. We identify potential weak points by using admin rights and access to server configuration files, database encryption principles, source code or architecture documentation.

Stress testing: Emulation of DDoS / DoS attacks

1Cyber security testing team evaluates the stability of your infrastructure and its components by testing it beyond normal operational capacity with the use of special tools such as Siege and Apache JMeter. We apply our expertise to emulate denial of service (DoS) or distributed denial of service (DDoS) attacks against your network or applications to:

  • Determine whether the robustness of software or hardware is satisfactory under stress conditions (e.g., heavy network traffic, process loading).
  • Identify potential errors that can occur in case of system overloading.

Network Protection

By increasing corporate network security specifically, you may decrease the risk of becoming the victim of privacy spoofing, identity or company’s proprietary information theft, Man-in-the-Middle and DDoS attacks.

We apply multiple defense layers to protect your corporate network and the sensitive data stored within it. 1Cyber security engineers know various ways to keep your proprietary information safe and reduce the probability that you will have to experience successful attack attempts against your network.

1Cyber security engineers offer their knowledge of Greenbone OpenVAS to provide you with a 360-degree view of your IT environment and obtain accurate analytical data on security events in real time with a OpenVAS SIEM solution.

OpenVAS Server

The core application responsible for performing the security tests on targeted systems and collecting results are performed via OpenVAS Server.

The tests are done via plug-ins, making the process flexible and allowing administrators to do the specific tests required.

The OpenVAS server package is available for various Linux distributions like Mandrake, Gentoo, OpenSUSE, Fedora Debian, Ubuntu and also FreeBSD.

OpenVAS Client

The OpenVAS Client provides graphical user interface which helps in managing and performing the tests, which in turn helps to analyze the results.

OpenVAS Client is also available for Microsoft Windows operating system, in addition to the Linux distributions and FreeBSD.

OpenVAS NVT Feed

OpenVAS NVT stands for Network Vulnerability Tests, and are provided for the OpenVAS Server through the OpenVAS NVT Feed. NVTs appears in the form of .inc or .nasl files, which will be digitally signed for authenticity validation.

OpenVAS services

We can provide you with the Delta reports of the scan results helping to analyse the differences between various scans on the server. Based on these reports we can get your servers patched or get the security tweaked.

OpenVAS solution softwares are freely available and gets updated, providing one of the powerful and comprehensive Vulnerability scanning and vulnerability management solutions.

OpenVAS, softwares helps you to easily schedule scans, and automatically generate reports, with options to email alerts if certain threat levels are found.

You can setup OpenVAS Services by getting in touch with us.

In case a company decides on applying a special online solution, such as CloudFlare, to protect their network against DDoS attacks, 1Cyber has the security experts with the skills in implementing and configuring such solutions properly. Our security engineers set them up to:

  • Prevent disruptions inside your network occurring due to anomalous amounts of malicious traffic.
  • Keep the components of your IT environment in a high availability state.
  • Analyze cyberattacks quickly in case they occur and let you adjust the security policies applied inside the corporate network to avoid such cyberattacks in the future.

We can help our customers to keep their corporate information safe in email communication and secure from unauthorized access, loss, etc. 1Cyber security experts will protect your network from phishing, spamming, malware, and other attacks against email services. Having worked with the solutions offered by major vendors, such as FortiGate and Cisco, we’ve gained the required experience to:

  • Integrate an email security solution you choose into your company’s infrastructure to ensure its smooth operation.
  • Perform the tuning of the chosen email security service to prevent your sensitive corporate data from being lost or (un)intentionally shared via email by your employees.
  • Configure your email security solution properly to reduce the probability your company will face email security threats.


1Cyber security team implements and sets the security rules of special solutions to control incoming network traffic, scan it to detect and block potential attacks. We offer you the following cybersecurity measures to apply:

  • Hardware or software firewall protection to avoid identity theft, malware, online fraud, and other common cyberthreats that may come from the internet.
  • An intrusion detection system (IDS) to promptly warn your system administrators on suspicious activities inside your network, and an intrusion prevention system (IPS) to block the attacks before they turn into serious security issues.
  • A data loss prevention (DLP) system to prevent critical corporate information from coming outside your network due to the users’ reckless behavior.


1Cyber security engineers configure antivirus protection to:

  • Improve the security of the network from viruses, spyware, and other types of malicious software coming from the internet or external drives.
  • Increase the protection of your network against phishing and spoofing internet attacks that aim at stealing your sensitive data.
  • Provide your system administrators with advanced control over any web activities happening across your network to prevent various types of cyberthreats from affecting the security of your corporate data.
  • Remove potentially harmful software and threats, thus blocking their way further inside your network.

Cybersecurity Consulting

1Cyber has been delivering full-scale consulting services in information security. We help our customers to protect their IT environments by proactively identifying security threats and gaps.

Enhance your information security through our competencies to:

  • Monitor how protected and robust your cyber-environment is against APTs, ransomware, and other offenses.
  • Identify existing vulnerabilities in your network to prevent potential attacks.
  • Uplevel the performance of your information security solutions.
  • Timely detect cyberattacks in your network.
  • Keep your sensitive data secure.
  • Ensure you’re compliant with information security standards in your industry.

Let us help you today.

Let Technology give your Business that Competitive Edge.

Companies of any size are getting exposed to advanced persistent threats (APTs) more than ever. 1Cyber security consultants configure and fine-tune SIEM solutions to perform proactive detection of APTs to avoid financial losses, sensitive data leaks and retain corporate reputation.1Cyber SIEM team will help your organization resist APTs by fine-tuning your security solution to make it scan your network thoroughly.

  • We check how well OpenVAS monitors the network and analyze if the platform can reveal APT presence.
  • We fine-tune your SIEM solution to enable proper monitoring of your current security state and detect visible signs of an APT.
  • We configure and fine-tune OpenVAS to factor in possible attack scenarios so that it can detect APT symptoms.
  • We provide OpenVAS with a set of specific correlation rules that will allow you to catch APTs in your particular business environment.

APT-focused SIEM solutions allow companies to:

  • Monitor their IT landscapes at different levels to capture an APT at any stage.
  • Analyze all security events in a single console. This enables detecting APT symptoms using the entire set of security parameters available in SIEM platforms.
  • Develop strong anti-APT defense in line with industry best practices.

1Cyber delivers penetration testing to identify potential gaps in companies’ networks that intruders can break through.

  • In cooperation with our customers, we choose between Black Box, White Box or Grey Box penetration testing to pick the profile that suits your case best.
  • We develop custom test scenarios to check networks, applications, services and operating systems.
  • We use a number of attacking techniques, such as SQL injection, spoofing, social engineering, etc., to cover every scenario that intruders may exploit to assail your company.
  • We analyze test results and put them together in a comprehensive report. The report shows how easy existing vulnerabilities are to exploit and how much damage such an exploit can cause to a compromised system.
  • We develop a rehabilitation scenario that includes our recommendations on how to eliminate the revealed aberrations and achieve a shellproof protection. On demand, we will fix the vulnerabilities properly.

Penetration testing allows our customers to:

  • Get a comprehensive overview of their network, application, and operating system vulnerabilities to be proactive and prevent attacks instead of combatting them.
  • Check if a system’s defense is still rocking after adding new applications, seriously modifying the current ones, or introducing new offices.
  • Understand if the current defense is sufficient, or if they should take measures to improve it.
  • Reveal potentially dangerous non-compliance with corporate security policies and industry-specific security requirements, such as GLBA, HIPAA, PCI DSS, FISMA/NIST, both compulsory and non-mandatory.
  • Prevent downtimes caused by systems’ inoperability that can spiral into huge financial losses and reputation damage.


1Cyber provides identity and access management (IAM) services based on IBM Security Identity and Access Manager.

1Cyber consultants will help you to keep your data safe by consulting on proper configuration of IAM Manager in accordance with your security landscape:

  • Role-based access: We implement a role-based access in your system to keep cybercriminals away from your sensitive data.
  • User account life cycle automation: We automate user account life cycles to optimize their output and facilitate user profiles management.
  • Segregation of duties: We implement the segregation of duties model to enable flawless system performance when more than one user executes a task.

Why go for IAM:

  • To control access to corporate data.
  • To ban unreliable users’ access to corporate resources and sensitive data and to provide both data integrity and their accessibility for authorized persons at the same time.
  • To detect the presence of malicious administrators in your IT department.

Security Testing Services

We offer a comprehensive approach to security testing beyond penetration testing to promptly identify and eliminate security vulnerabilities in your IT infrastructure or applications.

1Cyber security testing team can help you get a deep insight into your IT environment cybersecurity state and provide with specific recommendations to strengthen the protection of your IT infrastructure or its components.

1Cyber strongly recommends checking the security of your network, applications, and the other parts of your IT infrastructure regularly (monthly, quarterly, or at least annually depending on your particular needs) to get the following benefits:

  • You get up-to-date information on the security vulnerabilities existing within your IT environment.
  • You stay aware of any new vulnerabilities occurring in the result of the addition, changing, or removal of your IT environment components and modification of end-user policies.
  • You maintain the compliance with the requirements of security regulations and standards (HIPAA, PCI DSS, etc.).

Let us help you today.

Let Technology give your Business that Competitive Edge.

Since attackers discover new sophisticated ways to find and exploit vulnerabilities in the corporate networks, applications, etc., vendors of information security services have to think several moves ahead and make up new ways to protect customers’ IT environments.

The security testing team detects and prioritizes security weaknesses in your IT infrastructure components and provides customers with further recommendations on how to mitigate them. They evaluate the protection level in your IT environment both with automated scanning tools and manually.

1Cyber’s vulnerability assessment services imply reasonable costs along with high quality. The qualifications of our information security team allow detecting vulnerabilities and finding weak points in the following components of the IT environment:

Vulnerability assessment of IT infrastructure

IT infrastructure:

  • Network. We assess the efficiency of your network segmentation, network access restriction, the ability to connect to the network remotely, firewall implementation.
  • Email services. We evaluate the susceptibility to phishing attacks and spamming.

Vulnerability assessment of applications


  • Web applications. We assess the susceptibility of a web app to various attacks following Open Web Application Security Project (OWASP) Top 10 Application Security Risks.
  • Mobile applications. We evaluate the security level of a mobile app following OWASP Top 10 Mobile Risks.
  • Desktop applications. We assess how data is stored in an app, how this app transfers information, whether any authentication is provided.

Assessment Methods We Apply

Our security testing team combines automated and manual approaches to take the full advantage of the vulnerability assessment process.

  • Automated scanning: To start the vulnerability assessment process, 1Cyber’s security engineers use automated scanning tools the choice of which depends on each customer’s needs, requirements and financial capabilities. These scanners have databases, which contain known technical vulnerabilities and allow detecting your company’s susceptibility to them. The main advantage of the automated approach is that it is not time-consuming and ensures a wide coverage of security weaknesses possibly existing in a range of devices or hosts on the network.
  • Manual assessment: 1Cyber’s security testing team performs the manual tuning of the scanning tools, as well as subsequent manual validation of the scanning findings to eliminate false positives. Upon the completion of such manual assessment performed by our specialists, you get reliable results containing only confirmed events.

Vulnerabilities Classification Techniques We Apply

When conducting vulnerability assessment, we divide the detected security weaknesses into groups according to their type, severity level, etc. following the classifications below.

  • Web Application Security Consortium (WASC) Threat Classification.
  • Open Web Application Security Project (OWASP) Testing Guide.
  • OWASP Top 10 Application Security Risks.
  • OWASP Top 10 Mobile Risks.
  • Common Vulnerability Scoring System (CVSS).

Classifying vulnerabilities allows 1Cyber security engineers to prioritize the findings according to the impact they may have in case of exploitation and direct your attention to the most critical weaknesses that need to be eliminated on a first-priority basis to avoid financial and security risks.

Threats tend to occur where security officers expect them the least. Naturally, an intruder won’t spend months trying to force a well-locked door, but will look for weak points and vulnerabilities in those information systems where security isn’t a priority. The combination of negligence and seemingly minor vulnerabilities may end up with serious consequences and lead to the system being compromised. The acknowledged way to reduce such risks is to employ penetration testing.

To prevent your organization from possible breaches and reinforce existing security controls against a skilled attacker, 1Cyber’s team offers penetration testing services based on a custom plan of a multistep attack that targets custom network infrastructure and applications.

We recommend to fulfill a pentest in case if:

  • Regularly scheduled analysis and assessments are required by regulatory mandates.
  • New network infrastructure or applications were added.
  • Significant upgrades or modifications to infrastructure or applications were made.
  • New office locations were established.
  • End-user policies were modified.
  • Corporate IT was significantly changed.

Ethical Hacking to Prevent a Potential Intrusion

1Cyber offers complete penetration testing designed to identify system vulnerabilities, validate existing security measures and provide a detailed remediation roadmap.

Our team, equipped with the latest tools and industry-specific test scenarios, is ready to deliver a thorough checkup to pinpoint system vulnerabilities, as well as flaws in application, service and OS, loopholes in configurations, and potentially dangerous non-compliance with security policies.

1Cyber performs the following types of a penetration test:

  • Network services test.
  • Web application security test.
  • Client-side security test.
  • Remote access security test.
  • Social engineering test.
  • Physical security test.

We apply 3 recognized penetration testing methods:

  • Black Box testing (external testing).
  • White Box testing (internal testing).
  • Grey Box testing (combination of both above-mentioned types).

3 Steps of a Penetration Test

Pre-attack phase / Planning

  • Defining the intruder model (internal or external, enabled rights and privileges).
  • Defining goals, source data, scope of work and testing targets.
  • Determining the scope of a target environment.
  • Developing the testing methodology.
  • Defining interaction and communication procedures.

Attack phase / Testing

  • Fieldwork, service identification.
  • Custom scanning or intrusion tools are developed if needed.
  • Vulnerabilities detection and scanning, elimination of false positives.
  • Vulnerabilities exploit and gaining an unauthorized access.
  • Utilization of compromised systems as a springboard for further intrusion.
  • Reporting

Post-attack phase / Reporting

  • Result analysis and reporting with recommendations for reducing risks.
  • Visual demonstration of the damage that can be inflicted to the system by an intruder.

Additionally, we can also eliminate the detected vulnerabilities.


At the end of the penetration testing procedure, we provide our customers with an extensive set of reports and recommendations to effectively eliminate the detected breaches:

  • Brief description based on the achieved results and findings.
  • List of detected system vulnerabilities and their classification according to how easy they are to exploit and how harmful for the system and business they may be.
  • List of changes in the system that were implemented during testing.
  • Test protocol (including instruments and tools used, parts that were checked and issues found).
  • Actionable recommendations to eliminate the revealed security issues.