About us

Our company, Silent Signal Kft. has been performing IT security assessments along with related consulting and training since 2009.

We strongly focus on the outstanding professional quality of our services, with our experts having years of international experience in the field.

Our technical team has the following international qualifications: CISSP, OSCP, OSCE, OSWP, GPEN, GWAPT, SISE, ASFP.

Zoltán Pánczél
Senior IT security manager
András Veres-Szentkirályi
IT security expert
Péter Szabó
Bálint Varga-Perke
IT security expert

We're proud that our clients include businesses in more than 10 countries. Most of our clients continued working with us after the first project on a regular basis; they realized that our efforts improved their security significantly. As a result, we signed framework contracts with many local and international corporations to ensure continuous cooperation.

We consider a project successful if

  • by doing a high-quality professional job
  • based on a methodology that fits the needs of the client
  • in a comprehensive manner

we can contribute to making the system, network or application being tested more secure.

In the case of vulnerability assessments, we follow international methodologies and best practices:

  • Institute for Security and Open Methodologies - Open Source Security Testing Methodology Manual 3 (OSSTMM)
  • Open Information Systems Security Group – Information Systems Security Assessment Framework 0.2.1 (ISSAF)
  • NIST Technical Guide to Information Security Testing and Assessment (SP800-115)
  • Open Web Application Security Project Testing Guide v4 (OWASP)
  • OWASP Mobile Security Testing Guide
  • PCI DSS - Penetration Testing Guidance

Besides our security assessments, we have notable research activity. As a result, our experts discover and report vulnerabilities in products made by leading IT vendors on a regular basis. These include

  • Security products: Aruba, BitDefender, FireEye, McAfee, Panda Security, Symantec, Trend Micro
  • Enterprise and end user products: Apple, HP, IBM, Novell
  • Industrial products: National Instruments, Schneider Electric
  • Telecommunications: Cisco, Ericsson, Juniper, Motorola, Vodafone

It's an honor for us that we get requests to speak at the important local IT security conferences all the time, and we make regular appearances as experts in the media. Our goal is that our clients realize the vulnerabilities and risks, which could mean a threat their business if exploited.

Creating, maintaining and supervising information security systems and processes is a complex task. In order for us to provide you a discreet “Silent Signal” regarding these, don't hesitate to contact us. Find out how we can help you with our services before it's too late!