Services
Below we have listed some of the typical projects where Zencurity can help customers build a more secure organisation. Special requests are also possible, so please ask. We work in security and internet projects, such as:
Security Testing and Pentesting
Since SATAN was released we have kept up to date on penetration testing methodologies and tools,
- Pentest and security services with focus on network infrastructure and reviewing
- Audit of infrastructure, firewalls, network devices, wireless, logging infrastructures
- Review of the internet connectivity infrastructure
- External port scan, pentesting and vulnerability testing, vulnerability scans are performed using commercial and open source penetration testing tools
- Building secure infrastructures, including firewalls, Intrusion Detection Systems (IDS) or logging infrastructures Prepaid hours can be used for any of our services, and are estimated on a case-by-case before being initiated. This ensures that customers are in control of the projects.
Implementation services, Logging and IDS
We can help select and implement a variety of devices, such as:
- Secure infrastructure firewalls, switches, routers - securely with a best practice configuration
- Application-related embedded Linux, architecture, secure programming
- Monitoring solutions using available open source software
- Installing centralized logging services and configuring alerts
- Intrusion Detection Systems based on Suricata IDS, Zeek Security Monitor and other similar tools
- Audit and review services
We can audit servers and infrastructure device configurations from most top vendors.
Registering internet resources
We can help you request internet resources like IP address assignments and AS numbers from RIPE NCC.
- We charge a 100 EUR administration fee for the Independent Assignment Request and Maintenance Agreement
- We charge 100 EUR for each Independent Internet Number Resources for which we are charged a maintenance fee from RIPE NCC
- We can also help register your company with RIPE NCC as a LIR (Local Internet Registry) for a fixed price
The current RIPE NCC Charging Scheme 2025 can be found at the address: https://www.ripe.net/publications/docs/charging2025
We use the provided agreement templates from RIPE NCC: Sponsoring LIR Agreement (Independent Assignment Request and Maintenance Agreement
Performance and DDoS testing
Through more than 10 years we have helped organisations get an overview of the robustness of their infrastructure with simulated high speedd attacks. We provide a full range of attack scenarios:
- DDoS testing with packet based attacks on layer 3-4
- Web sites stress testing all the way to layer 7 and application stacks
We have a very small but extremely useful project of only one night of testing from 22:00 to 06:00 charged double, so total of only 16 hours plus a recommended workshop of 4 hours for result presentation. This project has multiple proven to reveal critical knowledge about current protection at organisations, and provided recommendations for improving the network.
ISMS
An Information Security Mangement System will help your organisation make decisions about what’s critical, important and non-essential business processes, and how each is best protected. Daily, weekly, monthly or annual controls then allows the organisation to take active steps in maintaining or improving their business security. The latest and “most appropriate” framework changes every few years, but managing risk to your organisation does not.
- ISA/IEC 62443
- ISO/IEC 27001
- ISO/IEC 27005
- CIS Controls v8.1
- EU NIS2
- EU DORA
- EU CER
Personal Digital Security
PDS is a program developed by Zencurity staff for at-risk individuals: Human right’s advocates, political activists, journalists, executives, board members, celebrities and other public figures.
We will review every aspect of the client’s digital life, identify activities, assets and threats which will inform the resulting prioritization and level of protection.
We will teach you how to create strong passwords, select and use multi-factor authentication, communicate securely in text, voice and video, safekeeping of computing devices, perform backups and test restore procedures, syncronize or share files with collaborators.
Information backup
We have considerable expertise in backups, restoration and disaster recovery. Hence, our backup services are off-site, ransomware-resistant and geo-redundant. They also include reporting and structured testing.
Domains
Internet domains that are properly managed are foundational to many organisations. We resell domains, provide secure DNS hosting and auditing of best practices to keep your online presence reliable.
Keywords
These are some of the technologies and keywords describing our world: Ethernet, Layer2, Layer3, SNMP, OSPF, BGP, firewalls, routers, switches, syslog, ACL, security, denial of service, syn flooding, DDoS, Kali Linux, OpenBSD, Nmap, portscan, Kibana, Elasticsearch, Suricata, Zeek-IDS, Zeek Network Monitor, Graylog, Metasploit, IEEE 802.1q, IEEE 802.11, IEEE 802.1x, STP, BPDU guard, IPv4, IPv6, ICMPv6, NTP, Cisco IOS, 802.3ad, Junos, pktgen, t50, hping3, Debian Linux, ARM, Netflow, Netconf, pentest, security, Logstash, SIEM, Ansible, HTTPS, TLS, IMAP, SMTP, DMARC, SPF