Obrela Security Industries SA

Obrela Security Industries
Address: 117 Argous Str. & 33-35 Timeou Str
Athens
10441
Greece
Telephone: +30 210 957 3750
Email: [email protected]
Website: http://www.obrela.com
Contact: Maria Giannatou
[email protected]George Daglas
[email protected]

Obrela Security Industries provides information security consulting services and products to assess and manage risk in complex enterprise environments.  Our services cover key aspects of information security including management frameworks;  threat/risk profiling;  process modeling;  on-line transaction integrity;  critical infrastructure resilience and sustainability;  wireless and wired networks analysis;  education and awareness;  crisis management;  and compliance.

Capabilities

Penetration Testing

Contact: George Daglas
+30 210 957 3750
[email protected]
http://www.obrela.com/our-services/professional-services/penetration-testing/

Assessments of the network, system and applications security mechanisms that clients apply in order to protect its information resources that go by the organisation’s network.

The aim is to assure that the application is secured applying organisation and technological controls which comply with internationally best security practices, protecting the information that the application processes, stores and manages.  Systems and applications are tested against the known security practices to ensure they adequately protect the business information that “passes” through it.

CREST Qualified Consultants:
Practitioner Security Analysts:  No
Registered Penetration Testers:  Yes
Certified Web Application Testers:  No
Certified Infrastructure Testers:  No
Certified Wireless Testers:  No

Cyber Security Incident Response

Contact: George Papamargaritis
[email protected]
Emergency Help: +30 211 800 3865

Obrela Security Industries (OSI) applies CSIR procedures in the context of a set of Real Time Threat Management Process, followed by OSI in their SIEM service.  The Real Time Threat Management process is comprised of a number sub-processes and acts as a wrapper for the Event Management services.  The process starts with incident identification or incident investigation, continues with the incident resolution, incident escalation and reporting.

CREST Qualified Consultants:
Practitioner Intrusion Analysts:  No
Registered Intrusion Analysts:  No
Certified Network Intrusion Analysts:  No
Certified Host Intrusion Analysts:  No
Certified Malware Reverse Engineers:  No
Certified Incident Managers:  No