Security Solutions

Elytron Asia Pacific

Why Elyton Asia Pacific

Specialised in information security and auditing

Voted 8 consecutive times amongst the top security experts by Google

Awarded medals by the US Government for services rendered under national security

Currently protects data from over 2.5 billion people globally

Specialised in military-level intelligence reports

Cyber Army,
Red Team & Artificial Intelligence

Vulnerabilities from the attacker's point of view

Systems attacked in Black Box format, with vulnerability detection and reporting with independent view for the company and suggestions for corrections

Smart spider exclusive tool

100% critical breach detection rate
since its inception, learning from
systems tested along with the world's largest companies (The Pentagon, Google, Apple, Nasa, among others)

Delivery of critical vulnerabilites

The only company in the segment with in-contract guarantee of the delivery of critical vulnerabilities

Data Loss Prevention

Data Loss prevention (DLP) is a data security technology that detects potential data breach incidents in a timely manner and prevents them by monitoring data in-use (endpoints), in-motion (network traffic), and at-rest (data storage) in an organisation network.


● Find data wherever it is stored
● Create inventory of sensitive data
● Manage data clean up


● Understand how data is being used
● Understand content and context
● Gain visibility into policy violations


● Proactively secure data
● Prevent confidential data loss
● Enforce data protection policies


● Define unified policy across enterprise
● Remediate and report on incidents
● Detect content accurately

End Point Detection Response (EDR)

Endpoint detection and response (EDR) platforms are a category of endpoint security tools, built to provide endpoint visibility, and are used to detect and respond to cyber threats and exploits. Gartner’s Senior analyst Anton Chuvakin defined the term in 2013 as tools that are primarily focused on detecting and investigating suspicious activities (and traces of such) on hosts/endpoints.

Enable detection

Cross-correlate data across the whole environment

Combine whitelisting and blacklisting with behavioral analysis

Able to observe endpoint activity without interfering

Empower IR and forensics investigation

Enable effective clean up and remediation

Compatible with your antivirus


PacketFence is written in Perl and makes use of common open-source components, such as MySQL, Apache, Snort and Nessus. It does not require a user agent to be installed on computers accessing the network. Its deployment is non-intrusive, and every interaction with users goes through a captive portal that can be accessed by every Web browser.

PacketFence currently supports ARP, DHCP/DNS and VLAN isolation techniques. Choosing the right isolation method depends on the size of your network and the networking equipment you possess. In this article, we cover ARP-based isolation, which works on any kind of networking equipment.

User registration

Worm and virus detection

Worm / bot detection

Pro-active vulnerability scans

Passive or in-line operation

User-directed mitigation/remediation

Security Posture Assessment Services (SPA)

What is your current Security Posture?
Organisations lack the visibility across Compliance & IT Risk exposure and are unable to take proactive action.

Regulatory Compliance Assessment

Penetration Testing

Enterprise Vulnerability Assessment

Security Program Assessment

Network Security Architecture Assessment

Application Security Assessment

Human Based Vulnerability Assessment