YOUR PARTNER
IN ICT SECURITY

SECURING THE FUTURE

TwelveSec is an information security firm,
specialising in assurance, security management,
and InfoSec training services.

WE COVER THE ENTIRE RANGE
OF INFORMATION
SECURITY SERVICES

ASSURANCE | SECURITY MANAGEMENT | SECURITY TRAINING

Our expertise lies in:
• Penetration testing
• Vulnerability assessment
• ISMS development
• Application architecture review
• Whitebox web application security assessment
• Risk assessment
• Security studies

See our services

assurance

ASSURANCE

compliance

SECURITY MANAGEMENT

isms

SECURITY TRAINING

WHY TWELVESEC

ATTENTION TO DETAIL

Our main strengths lie in the experience of our team mebers, our flexibility and our attention to detail. We focus in providing quality services, spanning across the entire spectrum of engagement, assesment and reporting.
Our mission does not end upon project delivery, our aim is to deliver a holistic service, following up on realised projects and ensuring that our professional opinion has been fully understood by our clients and has been implemented down to the last detail.

TRUSTED BY

ote

Intrasoft

EU

elliniki-dim_new

Atos

Tracys

Vision mobile

Enisa

CERTIFICATIONS

CISSPcismoscpcisacehcriscSOTPITIL

WHO WE ARE

SECURITY SPECIALISTS

TwelveSec has one of the most experienced penetration testing teams in Greece and the Balkan countries, while our network of associates extends across three regions; Europe, North America and the Middle East.

Our team is comprised of veteran security specialists, who have extensive experience in the field and have implemented a large number of ICT security projects.


Meet the team

INNOVATION

IN THE SECURITY ASPECT
OF THE EMERGING IOT MARKET

The team at TwelveSec is committed in driving innovation in the security aspect of the emerging IoT market, helping identify vulnerabilities, recommend policies, and design the security architecture of the next IoT platforms.
This nascent market comes with a large number of inherent challenges, from device, platform, and vertical fragmentation to the actual connection infrastructure and protocols between completely different sets of devices.