We help our customers with more challenging cybersecurity problems and offer services such as penetration testing, malware analysis, forensic investigation, detection and prevention of targeted attacks, customized training on challenging security issues etc..
We focus on our specialized knowledge and area, and do not offer everything for everyone. We offer auditing and consulting services related to more challenging cybersecurity problems. In a nutshell, we offer those security services that others do not. When you need a specialist, Fitsec is the right partner for you!
Our customers are central to everything we do. Our role is to solve the complex cybersecurity problems they are facing. We tailor our services to meet our customers' unique requirements and are truly committed to helping them succeed. We focus on building relationships, not just individual transactions.
Cybersecurity threats evolve at an amazing speed. To keep up with the ever-changing threat landscape, we monitor developments in the security field, study malware and follow up on threats on an ongoing basis. As we are constantly developing our skills, we can always offer our customers the latest expertise in cybersecurity.
By working together, we can build on the individual skills of all our experts and thus ensure high-quality work. In each project, we share our knowledge and join forces to achieve a common goal.
We tailor our services to meet the requirements of each individual customer and make sure that the end results are pleasing to both parties. We operate and serve our customers with agility in mind, whatever the situation.
Switchboard +358 9 354 01360
Technical product support (weekdays 9-15)
+358 40 776 6644
Director of operations
+358 50 447 9876
+358 44 241 1442
Cyber Intelligence Specialist
Country Manager (Gulf area)
© Fitsec Ltd 2020 | Hevosenkenkä 3, 02600 Espoo, Finland | firstname.lastname@example.org
The USBguard service guarantees safe file transfers between USB mass storage devices. The service includes the USBguard device, which enables you to scan USB drives for malware, copy files between them and format them securely.
When you use the USBguard, you will never have to plug unknown USB devices into your own computer.
You can read more about the service at: usbguard.fi
The APT (Advanced Persistent Threat) feed contains identifying information of targeted attacks. This information can be integrated into various systems such as firewalls and other technical solutions to protect your organization. The feed is constantly being updated with the latest information, by researching attacks and malware used in them. This makes it possible to detect even the most sophisticated attacks.
All our feeds come with a 2-month free trial period, so that you can evaluate their benefits to your organization. To read more about the service and other feeds, please visit:
The Sentry is a service that is designed to detect targeted attacks. When a targeted attack successfully breaches an organization, it is extremely important to be able to detect it is quickly as possible and thus prevent greater damage. The service includes the Sentry workstation installation, which find targeted attacks and also more traditional bulk malware.
When the software flags something as suspicious, the suspicious machine code is sent to our experts for manual analysis to find out what the program does.
The Sentry is a full service that also includes all of the necessary clean-up work that is required after finding a malware infection. Forensic investigation and malware analysis is always performed to ensure that we can find out, for example, what the program has tried to steal. Forensic investigation will also reveal how the malware has entered your network. The customer is always notified of any findings.
The Asset/GDPR tracking service enables you to track your valuable information and find out if it is freely floating around the internet. By tracking your data, you can quickly react in the event of a data breach or other incident, and gain insight into the security of your environment to fix problems proactively.
The service also helps your organization with compliance regarding GDPR and in the event of data breaches more specifically. By using the service, you can quickly detect breaches and inform the affected parties right away.
Asset & GDPR Tracking can find out the following, for example:
• Database breaches
• Stolen credit card information
• Hijacked domain names
• Leaked sensitive documents
• Use of work emails for private matters
The Asset & GDPR tracking service includes a 2-month FREE trial period, so that you can evaluate the service's benefits to your organization.
Fitsec offers an incident response service in which an expert will be deployed to help you in the event of a security incident. When a breach happens, it is extremely important to prevent further damage by reacting quickly.
Our experts will solve the issue and perform all necessary actions to make sure your environment is safe and usable again as soon as possible.
When examining the situation, we will find out for example:
• What systems have been breached
• How to contain the breach and prevent further access and damage
• How to protect your network to prevent the malicious software from spreading to other systems
• How to contain the malicious software for further analysis to find details of how it got through and what it does
• How to completely neutralize the threat and clean up all systems
Malware analysis is a service in which we find out what a malicious program does. Analysis of the malicious program and its code can reveal highly useful information for your organization to help you prevent attacks in the future. We will find out for example how the malicious program was introduced into your network, what the program was made for and what it has tried to steal. Analysis will also reveal if it has tried to spread around your network and how we can remove it completely.
When a data breach or malware infection occurs, it is important to find out exactly what has happened, when it has happened and who is possibly behind it.
This process involves copying the entire disk for close inspection. Forensic investigation aims to find out for example:
• How the malware got through to the system
• In the case of a data breach, how the data was exfiltrated
• Provide proof of the innocence or guiltiness of certain parties
During the first day of training, participants gain insight into the different mechanisms that attackers use to gain access to organizations.
The second day of training is focused on teaching participants about prevention and observation methods that can be used to minimize the damages of targeted attacks.
The 2-day training aims to teach your staff how detect targeted attacks efficiently.
Participants learn about different USB security risks and how to effectively minimize the risks of different attacks.
The training also helps your staff to suspect and detect different types of USB attacks.
In addition to these ready made training packages, we offer completely custom training options for your organization. Contact us for further information!
During the workshop we map out your existing processes regarding malware infections and aim to find cost-effective solutions on how existing processes can be improved, new processes formed or old and redundant processes removed.
The workshop also helps to cost-effectively improve your observation skills regarding malware infections.
Reverse engineering involves finding out what a program does by completely analyzing its code. Our experts analyze the machine code to find out for example:
• What a malicious program does in the system
• Whether there are any serious vulnerabilities in a program that you assume is safe
If you have a program and you have lost the source code, it might be possible to get some parts back to help build the source again.
The service ensures the security of your control systems by testing if they can be accessed by attackers. We look for vulnerabilities in a safe environment and aim to find them before attackers can use them.
With Fitsec, the SCADA-audit does not risk your operations. We construct a copy of the actual system, software versions and devices in a safe environment where we observe how it reacts to different attacks.
All findings will be immediately disclosed to the customer, who can then further inform the vendors.