
WALLIX PAM
WALLIX PAM is designed to manage and secure privileged accounts within an organization’s IT and OT environments. Privileged accounts are those with elevated permissions used by people often held by administrators, IT personnel, or third-party vendors, but also software and machines, that provide access to critical systems and sensitive data. WALLIX PAM focuses on controlling, monitoring, and securing access to these privileged accounts to mitigate the risk of unauthorized access, data breaches, or misuse of sensitive information.
WALLIX Remote Access
Most businesses rely on external service providers to perform remote tasks that require privileged access to their IT or OT network. Half of them do not have an inventory of third-party access to their network, have little or no visibility and control over their remote digital access. WALLIX One Remote Access helps meet the new access requirements for provisioning and enabling secure access to external service providers who need to access critical infrastructure managed by WALLIX One.
WALLIX IDaaS
Digital transformation has significantly altered our perception of identity. Balancing competing priorities such as eciency, productivity, and security across a diverse range of in-house and cloud-based applications has intensified the responsibilities of IT teams. They now face a more significant challenge in accurately identifying individuals accessing corporate systems and ensuring secure and ecient access to maintain seamless business operations. WALLIX One IDaaS addresses the challenges and risks associated with authenticating employees and contractors to corporate resources remotely
WALLIX MFA
Your users’ names and passwords can be hacked or cracked: using a multi-factor authentication solution increases authentication security. Eliminate password risks and have your privileged users use multiple credentials. multi-factor proof-based verification of a user’s identity provides the control needed to access corporate systems.
WALLIX IAG
With WALLIX IAG, regaini Identity and Access Governance (IAG) enables the implementation of security policies for managing the rights assigned to employees and contractors, ensuring their legitimacy. Users should only access IT system resources essential for their business requirements and in accordance with their role-based rights. WALLIX IAG enables you to map and control access rights daily, aligning closely to your employees’ movements. It helps you save time through high-performance management of your business teams’ rights, with a collaborative vision and “automated” execution of review campaigns
Founded 15 years ago, Arrownex is a leading UAE-based company with a strong presence across the region. With offices strategically located in Abu Dhabi, Dubai, Fujairah, India, and partner locations in Saudi Arabia, Qatar, and Nepal, we specialize in delivering cutting-edge cybersecurity awareness programs, comprehensive cybersecurity solutions, and professional services.
Dubai
Al Saheel-2 Business Tower
Office 505, 5TH Floor
Al Nadha-1, Dubai, UAE
Tel: 971-04-4456708
Abu Dhabi
AL ARYAM TOWER BLOCK A
OFFICE NO 104 - 1st Floor
Abu Dhabi, UAE
Tel: 971-02-6228107
Email: info@arrownex.com
Copyright © 2024 cybal All Rights Reserved.
Security Researcher – Chief Business Strategist
Vivek N J is a seasoned Security Researcher specializing in IoT pentesting, Firmware Analysis, System Security, and Cryptography. With over 10+ years of experience, Vivek has developed a strong expertise in securing IoT devices and analyzing firmware for vulnerabilities. As a Mentor and Lead of the Hardware Security Team, Vivek has played a key role in shaping and guiding fellow researchers in the field. He has extensive experience in testing and creating exploits for products like TP-Link, Asus, and Draytek routers, enhancing the overall security posture of these devices. Vivek is well-versed in performing Vulnerability Assessment and Penetration Testing (VAPT) assessments, providing comprehensive security evaluations for various systems. Additionally, Vivek possesses a deep technical interest in areas such as Applied Crypto, Public Key Crypto, Homomorphic Encryption, Multi-Party Computation, Post-Quantum Crypto, Linear and Differential Cryptanalysis, and Zero Knowledge Proof, showcasing a strong passion for cryptographic research and advancements.
Security Researcher – Chief Business Strategist
Sreekumar R Koyickal is a versatile Chief Business Strategist with nearly 3 decades of experience in software development, corporate training, business analysis, and product management. With expertise in Agile and waterfall methodologies, Sreekumar has hands-on experience across the software development life cycle (SDLC). Their collaborative approach and ability to work with diverse stakeholders, from CXOs to software developers, contribute to the successful delivery of projects. Sreekumar’s entrepreneurial background adds a unique perspective to problem-solving, innovation, and strategic planning. They have successfully ventured into software development and consultancy in India and the UK since 2004, while also mentoring startups and sharing their knowledge and experience. Beyond IT, Sreekumar’s interests span organic cosmetics, Indian handlooms, and agriculture. With a wealth of experience in software development and a strong business mindset, Sreekumar is well-equipped to drive successful outcomes in the industry
Security Researcher – ICS / SCADA System Security
Season Cherian is a skilled Security Researcher specializing in ICS/SCADA System Security, IoT Eco-system which includes Wireless Security, Hardware Security, Radio and Communication Security and Firmware Security Assessment. With over 6+ years of experience, Season possesses a comprehensive understanding of securing critical infrastructure systems and IoT devices. He has developed CTF tournament challenges in the areas of ICS/SCADA, Wireless, Reverse Engineering, and IoT for esteemed clients like Schneider Electric and Cisco. Season has a proven track record in conducting IoT security assessments, identifying vulnerabilities, and implementing robust security measures. As a Project Lead, Season has been instrumental in creating an ICS miniature prototype to showcase real-world attack scenarios, enhancing awareness and preparedness in the field.
Founder – amFOSS / BI0S
Vipin Pavithran is a highly accomplished individual with over 10+ years of industry experience and 15+ years in academia. As the Founder and Chief Mentor of renowned student clubs such as amFOSS, Team bi0s, and Team Shakti, Vipin has made significant contributions to the field of cybersecurity. Additionally, he serves as the Director of Traboda CyberLabs, a leading cybersecurity company. Vipin’s expertise and leadership in both academic and industry settings have helped shape the future of cybersecurity professionals, while his role as a Directos at Traboda CyberLabs ensures that cutting-edge solutions and services are provided to clients in the cybersecurity domain.
Security Researcher – IoT / Firmware / Cryptography
Vivek N J is a seasoned Security Researcher specializing in IoT pentesting, Firmware Analysis, System Security, and Cryptography. With over 10+ years of experience, Vivek has developed a strong expertise in securing IoT devices and analyzing firmware for vulnerabilities. As a Mentor and Lead of the Hardware Security Team, Vivek has played a key role in shaping and guiding fellow researchers in the field. He has extensive experience in testing and creating exploits for products like TP-Link, Asus, and Draytek routers, enhancing the overall security posture of these devices. Vivek is well-versed in performing Vulnerability Assessment and Penetration Testing (VAPT) assessments, providing comprehensive security evaluations for various systems. Additionally, Vivek possesses a deep technical interest in areas such as Applied Crypto, Public Key Crypto, Homomorphic Encryption, Multi-Party Computation, Post-Quantum Crypto, Linear and Differential Cryptanalysis, and Zero Knowledge Proof, showcasing a strong passion for cryptographic research and advancements.
Security Researcher – Web / Mobile / Windows
Varun Nair is an accomplished Security Consultant with expertise in Web, Network, Mobile, API, Windows AD, and Linux Pentesting. With over 6+ years of experience, Varun has successfully conducted security assessments in diverse environments. They possess a strong background in cloud security, particularly in Kubernetes, Docker, AWS, and Azure Active Directory. Varun’s proficiency in various tools such as Burp Suite, Empire Tools, Kali pentest tools, x32/x64 dbg, and Ghidra enables them to efficiently identify vulnerabilities and implement robust security measures. With a broad programming language knowledge encompassing Java, C++, Python, C, .NET, Go, Assembly, SQL, Unix scripting, and Ethereum Smart Contract, Varun brings a versatile skill set to tackle complex security challenges
Security Researcher – Web/ API / Mobile
Aswin M Gupta is a highly skilled Security Researcher specializing in Web, API, and Mobile security. With over 10+ years of experience as a cybersecurity consultant, Aswin has worked with prominent organizations like Schneider Electric, where he has developed 50+ training labs for educating employees on cybersecurity. Aswin has extensive experience in conducting penetration testing for a diverse range of clients, including hospitals, colleges, and financial institutions. Additionally, Aswin actively mentors with Team bi0s and organizes Capture the Flag (CTF) programs to foster the growth of junior professionals, college students, and cybersecurity enthusiasts.
Security Researcher – Mobile & Web
Arjun TU is a highly experienced Security Researcher specializing in Reverse Engineering, System Security, Cryptography, and Malware Analysis. With over 10+ years of expertise, Arjun has developed an integrated Secure Coding Framework and possesses in-depth knowledge of offensive and defensive security techniques. As an accomplished trainer in cybersecurity, Arjun brings valuable skills and insights to educate and empower others in the field.
Security Researcher – Mobile & Web
Abhinand N is a seasoned Security Researcher with 6+ years of experience in Mobile and Web vulnerability analysis and penetration testing. He has successfully identified and reported vulnerabilities in various Android apps on the Google Play Store and has been leading the Mobile Security team in various VAPT projects. With expertise in OWASP Top 10 Mobile, Frida, Burp Suite, and more, Abhinand provides comprehensive security assessments, ensuring robust protection for clients’ applications. His ethical behavior, strong communication skills, and commitment to confidentiality make him a trusted professional in the field.