Home

Company Profile

Maritime – Phaistos CybSec is a company that evaluates, designs and produces information security solutions for maritime and shipping industry.

From this service, it provides shipping companies with the necessary tools, hardware and/or software, to protect their computing/electronic devices from cyber attacks. Academic staff from well-respected universities in UK coordinate specialists into research and deployment of cyber security solutions.

Mission statement

Our goal is to provide the best cyber security protection possible in maritime and shipping industry using new innovative technologies.

Our Services

Risk assessment

We evaluate Control Centers and Oil Tankers, Container Vessels, Cruise Ships and Ferries using known information security standards.

Protection

We design and implement custom based security solutions to meet information security goals.

Support

We monitor our security solutions and adapt to the new threat landscape with our R&D team.

Our Products

Phaistos CybSec

is a company that evaluates, designs and produces information security solutions for Maritime, Aviation, Bank, Telcos and Financial industries. Academic staff from well-respected universities in UK coordinate specialists into research and deployment (R&D) of cybersecurity solutions.

CyberRadar

is a system which enables shipping companies to protect from civilian GPS spoofing and jamming. In GPS spoofing an attacker changes the current location of a ship which results in a change of course. In GPS jamming an attacker blocks GPS signals that result in loss of ship’s location.

Phaistos CyberEye

combines different intrusion detection technologies with a multi-layer approach to identify threats. Also, is offered as a service for GDPR/TMSA3 & NIS Directive compliance.     

CyberCrew

is an application which enables shipping companies to protect and monitor their crew. It implements customised technologies to protect devices and communications from adversaries. The customised technologies form a set of deployed protocols, algorithms and mechanisms based on our 20 years of research experience in the Information Security era.

CONTACT

FOOTER_SITE2