Icon
Contact us
Ask a question or describe your problem. We will contact you ASAP.
I consent to the processing of my personal data for the purposes necessary to contact me from the website of GBTI S.A. (in accordance with the Act of 29.08.1997 on the Protection of Personal Data, consolidated text: Journal of Laws of 2016, item 922).
GBTI S.A.

Providing IT security

Audit. Consulting. Protection.

A computer security audit is needed

when computers are used for:

Icon
storing personal data
Icon
access the online payment systems
Icon
accounting information system
Icon
access to electronic bank account management
Icon
collect, store and use customer data

and when company is going through:

Icon
organizational changes such as merge, takeover or expansion
Icon
change in the Board of Directors
Icon
significant changes in it's IT infrastructure or business processes
Icon
entering an International Market
Icon
joint venture with a foreign partner

86%

of web resources requiring login identification contain at least one critical vulnerability

SYSTEM METHODOLOGY OF WORK

Icon
Identification of IT environment structure by means of standard web services (www, SMTP, FTP, Telnet)
Icon
Recognition of computers and devices exposed to external Internet part, the type of operating systems as well as pplication software in order to detect known vulnerabilities
Icon
Preliminary information gathering using TCP & UDP scanners and security scanners available on the Internet
Icon
Analysis of computer network topology seen from the Internet
Icon
Analysis of the results for preparing attack simulation
Icon
Attack simulation
Icon
Evaluation of system security against destructive attacks, using public-available or selfmade tools
Icon
Evaluation of security system reaction during conducted attacks
Icon
Firewall security analysis
Icon
Analysis of penetration test results in terms of system integrity risk assessment and data access by unauthorized persons
Icon
Analysis of system documentation in terms of safety (network structure, configuration, devices used & software)

3 month

an average time frame to detect a targeted attack

ProxyScanner

Network inventorisation. Audit. Security monitoring.

ProxyScanner Caption Image
ProxyScanner system is a product made by GBTI S.A. for direct control over network infrastructure. The main goal which is accomplished by this system is network inventorisation, audit and security monitoring. In the business terms, it consists of best parts brought by product classes like NAC/NIDS/VA in a one, single device, allowing to save costs of integration problems and implementation. Using advanced passive and active algorithms, ProxyScanner is a great solution for those who value exemplary security without the need for large financial outlays. It is perfect for both small and large companies.
ProxyScanner Front View
Front view
ProxyScanner Side View
Side view
ProxyScanner Back View
Back view
Our product is under active development and being often extended by new functionalities.

In technical terms, ProxyScanner provides inventory, audit and supervision over network security. ProxyScanner is able to recognize type and informations of the network in which it is running, allowing to create a device connection map divided by their categories (for example: Printers, Servers, IoT devices) and their operating systesm (for example: Windows/Linux/OSX/Android/Embedded). Using advanced network algorithms, it allows for fully automatic detection of newly connected devices without administrator's knowledge and instant notification in user-friendly form like e-mail or SMS messages. Additional feature is full history of LAN activity, allowing administrator to trace whole chronology of his network usage. Each device connected to the network where ProxyScanner operates is immediately scanned within moment of connection, which allows to discover what kind of device was connect and what risks might it create if it won’t be removed from the network.

NetVisiord® technology performs automated security audit, using the methods performed in real penetration tests. Those methods are for example:

- unauthorized access,
- information disclosure,
- vulnerability detection (Vulnerability Assessment),
- incorrect configuration of services,
- notifications and reports.

ProxyScanner is a system which allows for plug-and-play installation, which allows even non-technicall staff to implement it and use it. All interactions with ProxyScanner is done by user-friendly website-based platform, which acts as “MasterServer” receiver – a centralized point for communication with the device to which all informations from the ProxyScanner physical device are sent. Every connection between the ProxyScanner device and the MasterServer is encrypted.

SERVICES

Ikona
Information Security Audit
Ikona
Preventing DoS / DDoS attacks, carrying out load testing
Ikona
Penetration testing
Ikona
Integrated protection of ICO, crypto-currency wallets, stock exchanges and blockchain projects
Ikona
Antiphishing solutions

980,000 BTC

Over $10 billion worth of bitcoins have been stolen from exchanges since 2011 (Reuters)

Early Cyber Hazard Detection System

Notifies you of security threats, malware and breaches inside your network to prevent intrusions, attacks, data leaks, and espionage

ECHDS is an intrusion detection and prevention tool to protect your network. It is a unique product by GBTI S.A., born out of our incident response expertise, skills in detecting malware and threat intelligence foundation.

As a component of ECHDS benefits from other products, which contribute to its effectiveness. GBTI’s SOC team is there for you 24/7 to prevent and remedy any network threats and breaches. Advanced persistent threat detection lowers cyber threats to your organization and ensure your network is protected from the most advanced cyber threats and threat actors.

Icon
Intrusion detection with immediate notifications on all relevant malware families
Icon
Automatic generation of reports about types of attacks
Icon
Top-tier usability and reporting features on detected threat
Icon
Incident response with manual review of critical incidents by our experts

1 hour

or less is needed for a criminal to steal information and money
Icon
You are on our website GBTI.PL
Icon
Icon
Call us +48 32 205 33 63
Icon
Icon
We will arange a meeting at convenient time
Icon
Icon
We will discuss your problems
Icon
Icon
We will choose the right solutions
Icon
Icon
We will sign the contract
Icon
Icon
We will conduct an audit
Icon
Icon
We will secure your environment
Icon
Icon
We will provide detailed reports
Icon
Icon
Your business is safe now

Partners

Contact

Our headquarters is located in Katowice, Poland.

Enjoy a in our office from Monday to Friday from 9am to 3pm.

We can discuss the details of cooperation and / or remotely provide on-line consulting services.

Choose a place where it will be convenient to negotiate or just contact us.