Icon
Contact us
Ask a question or describe your problem. We will contact you ASAP.
I consent to the processing of my personal data for the purposes necessary to contact me from the website of GBTI S.A. (in accordance with the Act of 29.08.1997 on the Protection of Personal Data, consolidated text: Journal of Laws of 2016, item 922).
GBTI S.A.

Providing IT security

Audit. Consulting. Protection.

A computer security audit is needed

when computers are used for:

Icon
storing personal data
Icon
access the online payment systems
Icon
accounting information system
Icon
access to electronic bank account management
Icon
collect, store and use customer data

and when company is going through:

Icon
organizational changes such as merge, takeover or expansion
Icon
change in the Board of Directors
Icon
significant changes in it's IT infrastructure or business processes
Icon
entering an International Market
Icon
joint venture with a foreign partner

86%

of web resources requiring login identification contain at least one critical vulnerability

SYSTEM METHODOLOGY OF WORK

Icon
Identification of IT environment structure by means of standard web services (www, SMTP, FTP, Telnet)
Icon
Recognition of computers and devices exposed to external Internet part, the type of operating systems as well as pplication software in order to detect known vulnerabilities
Icon
Preliminary information gathering using TCP & UDP scanners and security scanners available on the Internet
Icon
Analysis of computer network topology seen from the Internet
Icon
Analysis of the results for preparing attack simulation
Icon
Attack simulation
Icon
Evaluation of system security against destructive attacks, using public-available or selfmade tools
Icon
Evaluation of security system reaction during conducted attacks
Icon
Firewall security analysis
Icon
Analysis of penetration test results in terms of system integrity risk assessment and data access by unauthorized persons
Icon
Analysis of system documentation in terms of safety (network structure, configuration, devices used & software)

3 month

an average time frame to detect a targeted attack

SERVICES

Ikona
Information Security Audit
Ikona
Preventing DoS / DDoS attacks, carrying out load testing
Ikona
Penetration testing
Ikona
Integrated protection of ICO, crypto-currency wallets, stock exchanges and blockchain projects
Ikona
Antiphishing solutions

980,000 BTC

Over $10 billion worth of bitcoins have been stolen from exchanges since 2011 (Reuters)

Early Cyber Hazard Detection System

Notifies you of security threats, malware and breaches inside your network to prevent intrusions, attacks, data leaks, and espionage

ECHDS is an intrusion detection and prevention tool to protect your network. It is a unique product by GBTI S.A., born out of our incident response expertise, skills in detecting malware and threat intelligence foundation.

As a component of ECHDS benefits from other products, which contribute to its effectiveness. GBTI’s SOC team is there for you 24/7 to prevent and remedy any network threats and breaches. Advanced persistent threat detection lowers cyber threats to your organization and ensure your network is protected from the most advanced cyber threats and threat actors.

Icon
Intrusion detection with immediate notifications on all relevant malware families
Icon
Automatic generation of reports about types of attacks
Icon
Top-tier usability and reporting features on detected threat
Icon
Incident response with manual review of critical incidents by our experts

1 hour

or less is needed for a criminal to steal information and money
Icon
You are on our website GBTI.PL
Icon
Icon
Call us +48 32 205 33 63
Icon
Icon
We will arange a meeting at convenient time
Icon
Icon
We will discuss your problems
Icon
Icon
We will choose the right solutions
Icon
Icon
We will sign the contract
Icon
Icon
We will conduct an audit
Icon
Icon
We will secure your environment
Icon
Icon
We will provide detailed reports
Icon
Icon
Your business is safe now

Partners

Contact

Our headquarters is located in Katowice, Poland.

Enjoy a in our office from Monday to Friday from 9am to 3pm.

We can discuss the details of cooperation and / or remotely provide on-line consulting services.

Choose a place where it will be convenient to negotiate or just contact us.