
The SecurEnvoy Zero Trust Access Solution allows organisations to provide verifiable trust in every activity they perform. Our enterprise security solution delivers you a journey of identifying the user, device and location; discover exactly what data you have and where it is; classify that data effectively; control who has access to what data and what device; and then deliver your policy in control of data ensuring enhanced data protection. All with intelligent organisation control and monitoring with SecurEnvoy to support you on your journey.
SecurEnvoy’s Access Management Solution meets the challenge of managing user access across a wide range of systems and applications. The first step in your zero-trust approach to security. SecurEnvoy’s Access Management Solution ensures that only authorised users have access to the information they need, when they need it.
Passwords alone are not strong enough to protect your business-critical data and assets. The rudimentary “username and password” approach to security is easy prey for cybercriminals. SecurEnvoy MFA provides an additional layer of security via two-factor or multi-factor authentication.
Our multi-factor authentication solution is easy to adopt and simple to use for you and your users. SecurEnvoy MFA lets you choose and set up any personal device or hardware token for authentication, making it simple for users to accept authentication requests with the device and method that suits them and your business best.
With SecurEnvoy Data Discovery you can simply track sensitive data from the time it is created, through to modification and deletion.
Data users are automatically alerted to the discovery of sensitive data by email, in real time.
Users who understand the data and its context can check and remediate sensitive data themselves, becoming active members of the data security team.
Your staff are actively involved and constantly reminded of the importance of data protection.
Founded 15 years ago, Arrownex is a leading UAE-based company with a strong presence across the region. With offices strategically located in Abu Dhabi, Dubai, Fujairah, India, and partner locations in Saudi Arabia, Qatar, and Nepal, we specialize in delivering cutting-edge cybersecurity awareness programs, comprehensive cybersecurity solutions, and professional services.
Dubai
Al Saheel-2 Business Tower
Office 505, 5TH Floor
Al Nadha-1, Dubai, UAE
Tel: 971-04-4456708
Abu Dhabi
AL ARYAM TOWER BLOCK A
OFFICE NO 104 - 1st Floor
Abu Dhabi, UAE
Tel: 971-02-6228107
Email: info@arrownex.com
Copyright © 2024 cybal All Rights Reserved.
Security Researcher – Chief Business Strategist
Vivek N J is a seasoned Security Researcher specializing in IoT pentesting, Firmware Analysis, System Security, and Cryptography. With over 10+ years of experience, Vivek has developed a strong expertise in securing IoT devices and analyzing firmware for vulnerabilities. As a Mentor and Lead of the Hardware Security Team, Vivek has played a key role in shaping and guiding fellow researchers in the field. He has extensive experience in testing and creating exploits for products like TP-Link, Asus, and Draytek routers, enhancing the overall security posture of these devices. Vivek is well-versed in performing Vulnerability Assessment and Penetration Testing (VAPT) assessments, providing comprehensive security evaluations for various systems. Additionally, Vivek possesses a deep technical interest in areas such as Applied Crypto, Public Key Crypto, Homomorphic Encryption, Multi-Party Computation, Post-Quantum Crypto, Linear and Differential Cryptanalysis, and Zero Knowledge Proof, showcasing a strong passion for cryptographic research and advancements.
Security Researcher – Chief Business Strategist
Sreekumar R Koyickal is a versatile Chief Business Strategist with nearly 3 decades of experience in software development, corporate training, business analysis, and product management. With expertise in Agile and waterfall methodologies, Sreekumar has hands-on experience across the software development life cycle (SDLC). Their collaborative approach and ability to work with diverse stakeholders, from CXOs to software developers, contribute to the successful delivery of projects. Sreekumar’s entrepreneurial background adds a unique perspective to problem-solving, innovation, and strategic planning. They have successfully ventured into software development and consultancy in India and the UK since 2004, while also mentoring startups and sharing their knowledge and experience. Beyond IT, Sreekumar’s interests span organic cosmetics, Indian handlooms, and agriculture. With a wealth of experience in software development and a strong business mindset, Sreekumar is well-equipped to drive successful outcomes in the industry
Security Researcher – ICS / SCADA System Security
Season Cherian is a skilled Security Researcher specializing in ICS/SCADA System Security, IoT Eco-system which includes Wireless Security, Hardware Security, Radio and Communication Security and Firmware Security Assessment. With over 6+ years of experience, Season possesses a comprehensive understanding of securing critical infrastructure systems and IoT devices. He has developed CTF tournament challenges in the areas of ICS/SCADA, Wireless, Reverse Engineering, and IoT for esteemed clients like Schneider Electric and Cisco. Season has a proven track record in conducting IoT security assessments, identifying vulnerabilities, and implementing robust security measures. As a Project Lead, Season has been instrumental in creating an ICS miniature prototype to showcase real-world attack scenarios, enhancing awareness and preparedness in the field.
Founder – amFOSS / BI0S
Vipin Pavithran is a highly accomplished individual with over 10+ years of industry experience and 15+ years in academia. As the Founder and Chief Mentor of renowned student clubs such as amFOSS, Team bi0s, and Team Shakti, Vipin has made significant contributions to the field of cybersecurity. Additionally, he serves as the Director of Traboda CyberLabs, a leading cybersecurity company. Vipin’s expertise and leadership in both academic and industry settings have helped shape the future of cybersecurity professionals, while his role as a Directos at Traboda CyberLabs ensures that cutting-edge solutions and services are provided to clients in the cybersecurity domain.
Security Researcher – IoT / Firmware / Cryptography
Vivek N J is a seasoned Security Researcher specializing in IoT pentesting, Firmware Analysis, System Security, and Cryptography. With over 10+ years of experience, Vivek has developed a strong expertise in securing IoT devices and analyzing firmware for vulnerabilities. As a Mentor and Lead of the Hardware Security Team, Vivek has played a key role in shaping and guiding fellow researchers in the field. He has extensive experience in testing and creating exploits for products like TP-Link, Asus, and Draytek routers, enhancing the overall security posture of these devices. Vivek is well-versed in performing Vulnerability Assessment and Penetration Testing (VAPT) assessments, providing comprehensive security evaluations for various systems. Additionally, Vivek possesses a deep technical interest in areas such as Applied Crypto, Public Key Crypto, Homomorphic Encryption, Multi-Party Computation, Post-Quantum Crypto, Linear and Differential Cryptanalysis, and Zero Knowledge Proof, showcasing a strong passion for cryptographic research and advancements.
Security Researcher – Web / Mobile / Windows
Varun Nair is an accomplished Security Consultant with expertise in Web, Network, Mobile, API, Windows AD, and Linux Pentesting. With over 6+ years of experience, Varun has successfully conducted security assessments in diverse environments. They possess a strong background in cloud security, particularly in Kubernetes, Docker, AWS, and Azure Active Directory. Varun’s proficiency in various tools such as Burp Suite, Empire Tools, Kali pentest tools, x32/x64 dbg, and Ghidra enables them to efficiently identify vulnerabilities and implement robust security measures. With a broad programming language knowledge encompassing Java, C++, Python, C, .NET, Go, Assembly, SQL, Unix scripting, and Ethereum Smart Contract, Varun brings a versatile skill set to tackle complex security challenges
Security Researcher – Web/ API / Mobile
Aswin M Gupta is a highly skilled Security Researcher specializing in Web, API, and Mobile security. With over 10+ years of experience as a cybersecurity consultant, Aswin has worked with prominent organizations like Schneider Electric, where he has developed 50+ training labs for educating employees on cybersecurity. Aswin has extensive experience in conducting penetration testing for a diverse range of clients, including hospitals, colleges, and financial institutions. Additionally, Aswin actively mentors with Team bi0s and organizes Capture the Flag (CTF) programs to foster the growth of junior professionals, college students, and cybersecurity enthusiasts.
Security Researcher – Mobile & Web
Arjun TU is a highly experienced Security Researcher specializing in Reverse Engineering, System Security, Cryptography, and Malware Analysis. With over 10+ years of expertise, Arjun has developed an integrated Secure Coding Framework and possesses in-depth knowledge of offensive and defensive security techniques. As an accomplished trainer in cybersecurity, Arjun brings valuable skills and insights to educate and empower others in the field.
Security Researcher – Mobile & Web
Abhinand N is a seasoned Security Researcher with 6+ years of experience in Mobile and Web vulnerability analysis and penetration testing. He has successfully identified and reported vulnerabilities in various Android apps on the Google Play Store and has been leading the Mobile Security team in various VAPT projects. With expertise in OWASP Top 10 Mobile, Frida, Burp Suite, and more, Abhinand provides comprehensive security assessments, ensuring robust protection for clients’ applications. His ethical behavior, strong communication skills, and commitment to confidentiality make him a trusted professional in the field.