Show menu

Central Government

Government agencies need to allow easier access to information for citizens as well as share data between agencies, but the risk of security breaches and hacks adds unfortunate complications and costs. Fox-IT provides high-end security solutions to secure agency networks against breaches while allowing for the collaboration they have been tasked with providing.

Consultancy

Fox-IT consults and creates IT security solutions. We provide our unique expertise to governments, multi-nationals, vital infrastructures, financial and large organizations. We think along with architects of new services, applications and networks. We assist in building forensic solutions. We advise …
Read more >

Crypto Consultancy & Implementation

A high security level is necessary for environments that contain highly confidential information. In digital environments it is not easy to design a solution that provides complete cover, particularly as it also has to be workable for the users concerned. …
Read more >

DataDiode

Protecting sensitive data and critical systems is a major concern in view of terror threats and cybercrime. Not permitting any automated outside connection is still a common, although highly impracticable, way to achieve this. How do you benefit from the Fox …
Read more >

Digital Forensic Investigation services

More and more companies fall victim to Cybercrime such as fraud, industrial espionage, phishing or hacking. Fox-IT has begun the fight against Cybercrime. Our forensic IT experts conduct digital research and are specialized in recovering and interpreting digital traces. Fox-IT’s …
Read more >

FoxCERT

When business continuity and reputation are at stake, our experienced cyber crime and forensic IT experts ensure a swift and smart response.
Read more >

ProtACT

“If you can’t prevent it, detect it” Enterprises can spend millions on equipment to combat cyber attacks, but there’s still no guarantee of security. Just as in the real world, you cannot simply rely on preventive measures. Everyone working with …
Read more >

RedFox cryptochip

Creating certified cryptographic products used to be a complex task, especially if you require a certification for government use. Not only must the products provide unsurpassed levels of security, but they must also undergo lengthy evaluations by various certification bodies. …
Read more >

Security Audit

We trace security leaks in access control systems, in ‘secure’ USB sticks, PDAs, telephone networks, applications for Internet banking and government databases containing highly sensitive data. Audits We go that extra mile with every audit. We feel very much at …
Read more >

SecuVoice

Eavesdropping on mobile phone conversations has been possible for a long time. Up until now interception was the sole domain of intelligence and law enforcement agencies. However, the ease at which your telephone conversation could be intercepted is increasing. The …
Read more >

SINA

SINA enables organizations to connect physically separated networks through any secured or unsecured network. SINA stands for Secure Inter Networking Architecture and was developed primarily for State Secret networks of the German Bundesamt für Sicherheit in der Informationstechnik (BSI). The …
Read more >

Tracks Inspector

Investigators can now search through digital evidence themselves.   The volume of digital information involved in criminal investigation has risen dramatically in recent years. Right from the start of an investigation the detective closely involved with the case needs to …
Read more >

Training

Fox-IT offers a wide range of training courses. These courses are presented in the most practical way possible. Whether the topic is digital security or conducting investigations on the Internet, the participants spend as much time as possible at their …
Read more >

VECOM

Secure telephony for land lines, fax and mobile telephones The VECOM service is a joint venture between Sectra and Fox-IT. Following an assignment from the Dutch Ministry of the Interior and Kingdom Relations, a solution was developed to make it …
Read more >

Our website uses a cookie from Google Analytics. Click here for more information about our cookie policy and privacy statement. Click here to delete this message.

X