03:31:07 - 20.01.2026

Download Brochure

Banner

CyberSecurity Partner

Banner

ISO 27001 Certified

Banner

ISO 9001 Certified

Banner


Home About Us
IT & CyberSecurity Solutions PDF Print E-mail

 

DEKENEAS

Early detection system powered by artificial intelligence that identifies emerging threats

Our aim is to provide the means and methods needed to address the newest and most complex cyber attacks facing organizations and individuals in today's ever changing threat landscape. Our products encompass more than 30 years of experience in both offensive and defensive fields of operations and they were born from the actual needs security professionals encounter while facing real life attackers. Our flag ship product, the Browser Attack Detector, is an Artificial Intelligence powered web malware scanner able to discover known and unknown attacks against browsers, such as exploits, watering holes, crypto jacking or data skimming, for laptops, desktops, mobile, or IoT devices. The concept behind the Browser Attack Detector was presented at multiple esteemed cyber security conferences around the world and among the early adopters of this technology are companies such as ORANGE ROMANIA COMMUNICATIONS SA or public institutions such as Romanian National Cybersecurity Directorate. Along the Browser Attack Detector we also provide our customers with a cybersecurity threat intelligence platform that collects data about attacks against traditional technologies, but also about attacks against ICS/SCADA, medical or IoT technologies, and a decoy system ("Am I Owned") that transforms your networks and devices into honey traps that lure attackers, making them unveil the presence on the premises before they are able to perform any actual damaging actions. For more information about our products consult the detailed presentations for Browser Attack DetectorCyber Threat Intelligence and Am I Owned or contact us.

 

OTHER SERVICES

  • IT Governance
  • COBIT & ITIL implementation
  • Information Leakage Prevention - ILP / DLP
  • Information security management - including ISO 27001
  • Systems and process assurance (SPA)
  • Regulatory compliance (including PCI-DSS)
  • Physical Security Risk evaluation (Law 333/2003)
  • Penetration testing    
  • Disaster recovery planning
  • IT strategy and IT effectiveness
  • CIO advisory / CIO outsourced services
  • CISO advisory / CISO outsourced services
  • Incident response services
  • Malware analysis
  • VPN security analysis
  • Firewall and Web application firewall effectiveness evaluation