Partners

TAU RCRL works with the selected corporate partners to leverage practitioners' expertise. Liacom Systems and TAU had co-developed the PROGRESS CCMM in a public-private partnership, bringing together Liacom's hands-on expertise in CIP and TAU's cutting-edge insights. 

 

 

Liacom Systems has been a market leader in Information and Communication Technology (ICT) and Cyber Security for over 25 years. The company employs a team of over 150 senior consultants, each specializing in various technologies. Liacom Systems provides comprehensive services, including the development of strategic, technical, and operational plans. These services encompass the design, analysis, engineering, and implementation of complex and diverse systems for a diverse range of clients and industries, including government organizations, service providers, and both public and private entities. 

 

Liacom Systems has established itself as a prominent partner with various key organizations, including government entities and academic institutions. One of these partnerships is with Tel-Aviv University (TAU), where Liacom Systems and TAU developed a new model to assess cyber security maturity on a sectoral basis, known as Progress. This model brings together Liacom's hands-on expertise and TAU's cutting-edge insights and has become a leading solution in the field. Liacom Systems has extensive experience in applying this model to various situations and serving international clients. 

 

Since its foundation, Liacom Systems Limited has built a unique and thorough knowledge base in the field of Information and Cyber Security, based upon reaching practical experience in developing and integrating a broad range of systems and technologies available in the market. Liacom Systems possesses the knowledge and experience needed to cover all aspects of Information Security and Cyber Security at an organization – operational, organizational, and technological.

 

The expertise of Liacom Systems' employees includes, but is not limited to issues such as policy and regulations,  Network Security Intrusion Detection/Analysis, Wireless Security, Identity management and access control (Identity Management, Authentication, Web Access Control), Platform Security (Operating Systems Security, Data Storage Security, Vulnerability Management, Virtualization Security), Application Security (Email, Web, IM, Application Firewalls, Database, Software Development), Information Security Threats (Viruses, worms, and other malware, Spyware, Adware and Trojans, Rootkits, Identity Theft and Data Security Breaches, Web Threats, Email and Messaging Threats, Emerging Information Security),  Security Management (SIEM/SOC) and more. 

 

Liacom Systems’ experts are capable of handling the complete range of security aspects of a project during all the stages of its design and development, as well as carrying out general, organization-wide activities, such as risk surveys, threat discovery, and analysis, security policy design, regulations defining, technology research, solutions, and specially crafted tools design and development, and much more. 

 

The consultants of Liacom Systems have conducted studies, design, and deployment of security solutions, including detailed technical and functional specifications. In addition, we have prepared, monitored, and accompany tender processes of such systems and supervised the installation and implementation of the systems. 

 

Liacom Systems is engaged in a broad range of security-related activities, such as:

  1.  
  • Performing threats mapping and analysis and defining the policy and specific solutions essential for effective security drawbacks elimination.
  • Designing and developing an organizational security strategy, defining the security policy, and planning backup and recovery processes.
  • Developing specially crafted security tools and software.
  • Security validation.
  • Carrying out security policy and solutions implementation costs evaluation.
  • Policy and regulations – conducting studies and accompanying organizations in the certification process (procedural and technical) e.g., 27001, GDPR, etc.
  • Defining the measures and requirements for evaluation, testing, implementing, and integrating advanced security technologies in existing and future systems.
  • Performing penetration tests.
  • Supply chains audit and clearance of ICT systems
  • Designing secure system architecture
  • Identifying, testing, and integrating essential security technologies.
  • Building security test environments (Laboratories).
  • Implement leading tools based on the planned Security Architecture.
  • Design and implement CERT and CSIRT at national levels.
  • Implement Security Operations, Procedures, and Management including SOC.
  • Controlling and implementing the complete system’s development and integration life cycle, defining the required operational procedures, and providing training and promotional services.
  • Security tools development and integration.
  • Accompanying and controlling current security activities.
  • Maintaining security compliance through internal and external inspections.
  • Supporting periodic security testing to ensure compliance with standards.
  • Designing and implementing Business Continuity and Disaster Recovery strategies (BCP/DRP).

 

The broad range of solutions and applications, being designed and developed by Liacom Systems includes: 

  1.  
  • Isolated information services for the public and external users over the Internet.
  • Corporate databases and data warehouses security.
  • Strong and/or biometric authentication utilizing smart cards, Tokens, HSM devices etc.
  • Data encryption, security and Virtual Private Networking (VPN) over public and private networks.
  • Traffic filtering, segregating and bridging between differently classified networks.
  • DLP assessment and solutions. 

 

Cyber Security Project Lifecycle

  1.  
  • We have established and field-tested methodology covers all the phases of the Project Lifecycle.
  • The methodology was tested and fine-tuned in large enterprises, creating unique expertise in: 
    • Complex security architectures
    • Wide and highly spread security threats spectrum
    • High compliance and standardization demands
    • Advanced DRP and Availability requirements

 

Special developments

  1.  
  • Mobile forensic laboratory
  • Cyber awareness tools
  • Cyber training tools
  • More…

 

Why Liacom?

  1.  
  • Comprehensive one-stop-shop for cyber security projects of any scale and complexity.
  • End-to-end support of entire life cycle of the project.
  •  Vast experience and expertise both in the field of security and all the accompanying disciplines.
  • Experience in all areas – policy, regulation, technical, procedural
  • Experience with governmental bodies, defense and mission critical.
  •  Well-established, “battle-tested” project design and development methodology.
  •  Close acquaintance with high-security verticals, including highly protected financial, governmental, mission-critical environments, etc.
  • Deep knowledge and acquaintance with customer's needs in various business areas including banks/finance, defense and military, commercial, telecom, energy, transportation and more.
  • Expertise in technological solutions and products and their implementation in the organization.
  • Experience in many environments – computerization, technology, development and more.
  • Develop specially crafted security solutions. 

 

Previous Customer Experience Examples

 

Following are some examples of previous experience of Liacom Systems, in performing security analysis and implementation for various organizations; most of them are mission critical systems and infrastructure. 

  1.  
  • Governmental Ministries
  • Defense systems
  • Banks and financial institutions
  • Transportation (airports, trains, etc.)
  • Large enterprises
  • Utilities e.g., water, energy
  • Airlines
  • Telecommunications Service Providers
  • Others 

 

 

   The National Cyber Directorate 

 

The Ministry of Finance and the National Cyber Directorate have established a unique cyber fund in cooperation with the Inter-American Development Bank (IADB). The $2 million fund is designed to support Latin American and Caribbean countries in cybersecurity. In addition, Israel has joined the World Bank's new cyber fund and promotes cybersecurity strategies and projects together with the Gates Global Foundation and other donor countries such as the United States, Japan, Germany, the Netherlands, and Estonia. Both foundations fund training, consulting, and tool development for developing countries taking their first steps in cybersecurity. 

 

Such collaborations with developing economies represent a huge economic opportunity that helps Israeli companies enter new markets. Joining the funds will strengthen Israel's cooperation in the field of defense and create mutual information exchanges with professionals in significant roles in countries in the developing world. 

 

The funds will promote the Israeli cyber industry and provide Israel with a reputation, access to new markets, and a long-term advantage. According to data collected, Israel's previous investments in the Inter-American Development Bank's fund have already yielded tens of millions of dollars to Israeli industry. In addition, Israel's aid activity in this field strengthens Israel's status as a leader in the global cyber agenda. 

 

As per Chief Economist Shira Greenberg: "Israel's joining the Cyber Fund is part of a strategic move to promote cooperation with development banks and help promote the development of developing countries. This initiative is part of the Ministry of Finance's activity in the international arena to strengthen economic ties and cooperation with developing countries. The move will enable the building of the foundations for the absorption of advanced cyber technologies and will open up new opportunities for Israeli industry." 

 

According to Roy Yarom, Head of the Empowerment Center at the National Cyber Directorate: "Human progress in the 21st century is digital progress, and protected cyberspace is the condition for its realization. The agreements strengthen Israel's partnership with the global development community and cement its position as a leading player in assisting the developing world in creating a protected and enabling cyberspace. The joint activity will create economic and political bridges based on cyber defense between the Israeli ecosystem and new emerging markets for the benefit of all parties."

 

 

Tel Aviv University makes every effort to respect copyright. If you own copyright to the content contained
here and / or the use of such content is in your opinion infringing, Contact us as soon as possible >>