If your operations are critical, you are in the right company. We love complex challenges.

Critical infrastructure protection

Our cybersecurity solutions contribute to the protection of national critical infrastructure in Europe and North America. Complex deception systems in the energy industry, threat intelligence services to public utilities, tracking of the activity of Advanced Persistent Threat (APT) groups, our unique databases of threat actors and malware targeting Industrial Control Systems (ICS), and building & operating Security Operation Centers (SOCs) and Information Sharing and Analysis Centers (ISACs) are among our projects.

We are Strategic Partners of the Global Resilience Federation, a Virginia-based non-profit organization created to connect security and information sharing communities, for mutual defense, leveraging nearly 20 years of ISAC and ISAO expertise in the critical infrastructure arena.

Our experts have played a key role in formulating the legislation that governs the operation of national critical infrastructure by privately owned companies in the highly-regulated environment of the European Union.


    • Military supplier status
    • Defense exercises & training
    • Experience in the Middle East

We are members of the Biometric Technical Interoperability Workshop of the NATO Communications and Information Agency (NCIA). Participants include defense delegations from NATO member states, US government agencies including Defense Intelligence Agency (DIA), Federal Bureau of Investigation (FBI), Naval Criminal Investigative Service (NCIS), National Ground Intelligence Center (NGIC), Department of Defense Program Management Biometrics (DoD PM Bio), and US Army Europe and Africa (USAREUR-AF). NATO is represented by Supreme Headquarters Allied Powers Europe (SHAPE), NATO Special Operations Headquarters (NSHQ), NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) and the NCI Agency. Partner Organizations are INTERPOL, EUROPOL, European Union Agency for the Operational Management of the Large-Scale IT Systems in the Area of Freedom, Security and Justice (eu-LISA), Biometrics Institute, and academia. 


We are panelists and participants at the regular “Inclusive Bio- and Crypto- Innovation: How Law and Technology Co-Evolve” event of The Massachusetts Institute of Technology (MIT), School of Architecture and Planning (SA+P), Media Lab Department. A forum where lawyers are immersed in formulating the framework of regulation on disruptive technologies as early as possible. Organized by Dr. Andreas Mershin, director of the MIT Label Free Research Group, and Boston-based innovation attorney Dimitrios Ioannidis, co-founders of the Osmocosm non-profit foundation.

Partnerships with several Hungarian universities enhance the work of our research & development teams, enable professional experiments, as well as provide prolific encounters with talented researchers and professors.

Medical IoT

We have developed a wearable 3-lead stress-EKG kit, which consists of a smart compressed shirt with embedded sensors, a powerful algorithm processing 6000 data points per second, superior noise-filtering for use in dynamic environments (performance sports, military, emergency situations), and an environmental sensor correlating weather data with internal and external medical metrics. The technology enables research on never-before-seen data of active-lifestyle human behavior. Currently under FDA approval.

We have discovered previously unknown breaches of medical instruments and unpatched access to medical databases using our Cyber Intel Matrix (CIM) engines focused on IoT vulnerabilities.


Secure access control and reliable identification systems enable payment providers to eliminate fraud and save resources on KYC processes.

DataVersio solutions thrive in complex highly regulated environments because of their resilient approach and demanding security protocols.

Industry: ICS, OT

Manufacturing facilities, the energy industry, and public utilities benefit from enriched threat intelligence feeds we provide regarding the software and hardware environment powering Operational Technology (OT). We map device protocol attacks and specific threat actor behavior targeted at Industrial Control Systems (ICS), empowering our clients to take preventive measures with data they are not able to get anywhere else.

Supply Chain

Tracking of ingredients, food product journey, authentication of certifications, and validation of access credentials throughout the growing, harvesting, storage, sorting, processing, shipping, packaging, distribution, and retail stages of food & beverage products is displayed on a transparency scale to gauge its (Fair Trade, USDA Organic, Soil Association Certified Organic, Animal Welfare Approved, Non-GMO Project Verified, Food Alliance Certified, Salmon Safe, etc.) value to the consumer. Project in association with GeniHUB.

Enterprise resource planning (ERP)

Our resource planning and management platforms for the energy sector include simulated scenario modes used for training as well as emergency protocol mode with smart step-by-step process displays for use in high stress situations or personnel with limited training.

Our process management solution in a high-tech waste management plant optimizes selection cycles and prevents damage to expensive machinery, successfully replacing third-party industrial maintenance software.

Deception technology

Blackpot, our proprietary industrial honeynet, forms a global network of sophisticated emulated industrial environments, producing a data feed of industry-specific attacker IP addresses; malware; Tactics, Techniques, and Procedures (TTPs); and a vast array of metrics used to identify threat actors and divert rogue operations.

Tech brands

Over the years we have represented and distributed a number of well-known brands in the IT and cybersecurity markets globally. Our access to Google, Tesla, Apple, Amazon, IBM and the investment funds behind them is based on joint projects. For example the former Regional Director of the Microsoft Developer Network in Redmond, WA, heads up our encryption and digital authentication department.

Receivables collection software

We have developed an effective receivables collection platform for public utilities, improving cash flow, reducing costs, and raising the morale and public image of the companies.