background
  • Encryption / Cryptanalysis
  • Risk Assessment
  • Penetration Testing
  • Authentication / Biometrics
  • GDPR Compliance

Mastering Cyber Security. Adapting academic research into practice.

Phaistos CybSec

Phaistos CybSec is a company that evaluates, designs and produces information security solutions for Maritime, Aviation, Bank, Telcos and Financial industries. Academic staff from well-respected universities in UK coordinate specialists into research and deployment (R&D) of cybersecurity solutions.

Cyber Eye

Phaistos CyberEye combines different intrusion detection technologies in a multi-layer approach to identify threats. Also, is offered as a service for GDPR/TMSA3 & NIS Directive compliance.

Cyber Radar

CyberRadar is a system which enables shipping companies to protect from civilian GPS spoofing and jamming. In GPS spoofing an attacker changes the current location of a ship which results to a change of course. In GPS jamming an attacker blocks GPS signals that results to loss of ship’s location.

Cyber Crew

CyberCrew is an application which enables shipping companies to protect and monitor their crew. It implements customised technologies to protect devices and communications from adversaries. The customised technologies form a set of deployed protocols, algorithms and mechanisms based on our 20 years of research experience in the Information Security era.


disk_a

About PHAISTOS

CYBER SECURITY

PHAISTOS CYBSEC IS A COMPANY THAT EVALUATES, DESIGNS AND PRODUCES INFORMATION SECURITY SOLUTIONS FOR SEVERAL SECTORS, INCLUDING SHIPPING, AVIATION, BANKING AND TELECOMMS.

ACADEMIC STAFF FROM WELL-KNOWN UNIVERSITIES IN UK COORDINATE SPECIALISTS INTO RESEARCH AND DEPLOYMENT OF CYBER SECURITY SOLUTIONS.

Our Services

Experts from academia theoretically assess encryption schemes applied in a corporation. Academics also analyse systems and examine implementation parameters.

Corporations assets are identified, threat actors and sources are investigated, and risk level is estimated using the methodology from well know standards.

Custom penetration tools are applied to a corporation for identification of vulnerabilities.

Combination of technologies, such as face recognition with watermarking techniques, is applied to enhance source and entity authentication.

Industries

current projects

MARITIME

maxresdefault

BANKS

bank_albom_260915

AVIATION

rsz_wifi-5-hi

TELECOMMUNICATIONS

bo_tie

contact

footer_phaistos2