Our Solutions

All-in Solution

Our experts provid and plan 24/7 technical support services with product and security consultation.

SIMSAFE Cryptography Scheme

The SIMSAFE CRYPTOGRAPHY Scheme’s objective is to ensure that the SIM card software operating systems, encryption keys, and data access will only be at the disposal of the Federal Government of Nigeria.

The proposed SIMSAFE CRYPTOGRAPHY Scheme eliminates the likelihood of unauthorized access to the Nigerian operator's SIM cards and will create a trusted and secure environment for the subscribers.

The SIMSAFE CRYPTOGRAPHY technology is a very unique, state-of-the-art cryptography technology and innovative solutions.

The SIMSAFE CRYPTOGRAPHY scheme will introduce to the Nigerian GSM market the new generation of a GSM Microchip, which is:

    Super powerful with crypto co-processor
    Meets highest security standards
    Doesn’t have any backdoors
    Open for an audit by the relevant government authorities
    Unclonable

The capabilities of the new software will allow the Federal Government of Nigeria to exclude potentially vulnerable functions from the OS and, conversely, add additional protective functions, if necessary.

01

Security Consultation

Our team members have proven experience in training personnel on all domains of information security from security awareness training to training security experts. We give both remotely and on-site classes including frontal presentations, demos, and hands-on exercises.

Our Solutions and Products include:
    Strategic security solutions and risk management.
    Security analysis and assessment solutions.
    Secure Development Lifecycle (SDL).
    Cybersecurity training.
    Subscription / maintenance.
    Real-time crisis solutions.
    Cyber Security Protection System.

02

Digital ID

Smart-card based personal identification document with secured storage for personl data, incl. biometry.

Implementation:

    eGovernment
    eVoting
    Biometry
    Identification
    ePassports
    Social Securities
    Driving licence & etc.

03

24/7 Technical Support

Our team has a comprehensive understanding of cross-organization processes and procedures including software development, network infrastructure implementation and management, existing system maintenance, sub-organization interconnections, and everyday computer-related procedures and routines.

Our security review is carried out by an organized methodology based on the most stringent civil standards adapted to the unique needs and structure of the business environment and to ensure the attainment of three objectives:

    High level of findings.
    Quality and affectivity in security solutions.
    Preventing harm or system downtime.

04
Image

Copyright @2020 Balmun Dazang.