A.M.M.A. LTD
Electrical Control System
About Us
A.M.M.A. electrical area activities performed for the last 12 years working with the privet, public, and military sectors including but not limited to: Israel Air Force, Israel navy, The Technion institute of technology, and many more. The company provides the highest standards of solutions to its customers.
Information and Network Security:
For the past decade, A.M.M.A. has provided information security consulting to Telecom companies, Military units, and private and public companies.
Network Architecture & Design
Evaluating any network's design and architecture using the latest best practices to provide clear recommendations on how you can most effectively make security improvements. Helping you understand which components carry the highest risk, how to remedy specific security issues and vulnerabilities, and how changes will impact the security of your environment. to narrow the gap between your network's intended design and its actual security level.
Operating System Security
Secure operating systems are an integral part of your infrastructure's security. Provides in-depth experience and intimate knowledge of all major operating systems. Provides direction in any stage of the operating system security process-from choosing an appropriate O.S. for a critical application to designing a secure build and profiling a system's security over its lifetime. In addition, our proven methodologies for designing, hardening, and assessing operating system security ensure that your applications are deployed on the most secure platforms possible.
Incident Response
provides rapid reaction to a break-in so that security gaps can be plugged in and damages after the security incident are assessed. We will help to keep your information discreet.
Software Protection
Provide an easy way to protect your software against unauthorized modifications and manipulations by crackers by encrypting and closing the application files.
Security Plans
The insight provided by the Risk Assessment process is the foundation for constructing a comprehensive Security Plan. The Security Plan provides recommendations applicable to the entire enterprise. It is designed to provide the optimal cost-effective solution given the client's security needs - as established through the Risk Assessment and according to the client's organizational limitations. The Plan is based on risks, requirements, solution costs, and the client's business practices.
Penetration Test-Vulnerability Analysis
- Simple Penetration Test
- External Network Risk Audit
- Internal Network Risk Audit
- Web Application Penetration Test
- Social Engineering Evaluation
- Physical Security Assessment
- External Vulnerability Scanning
- Internal Vulnerability Assessments
- Firewall Assessment
- Encryption Assessment
- Wireless Security Assessments
- ERP/CRM SYSTEMS Assessment
- Network-Layer Equipment Assessment
- Risk Assessments
- Operating systems Assessments ( Unix, Linux, A.I.X., DIGITAL, HP-UX, Solaris, Mainframe & VMS, Novell 3-6.X, Windows NT,2000,2003, etc.)
Our customers in the information security field include but are not limited to Bezeq (Israeli Telecom), I.D.F., Motorola International, Most Israeli Banks, military units, Comverse, and many more.
The company works in cooperation with companies throughout the world, among them:
K.A.S.H.T.A.N. group - http://www.kashtan.co.il/
Schneider Electric - http://www.schneider-electric.co.il/sites/israel/en/home.page
DATAKOM - http://www.datakom.com.tr/
Freescale - http://www.freescale.com/
Senix - http://www.senix.com/
PULSAR - http://www.pulsar-pm.com/
MEGATRON Electronics & Controls Ltd - http://www.megatron.co.il/
B.E.E. International - worldwide supplier of high-pressure homogenizing systems - http://www.beei.com
Cmer - http://www.cmer.com
ComAp creative engineering – http://www.comap.cz/