Last Update September 14, 2018

Categories

  • IT, Computing and Software
  • Services (R&D, training, engineering, consultancy, …)

KÜRT Co., has grown from a small, Hungarian-owned enterprise into an international company group, developing technologies and solutions for information protection, data loss prevention and data recovery. KÜRT has earned considerable recognition and acclaim for its cutting edge technologies.

KÜRT Co. has been present on the IT market for 26 years. The company offers innovative solutions for eliminating the consequences of IT disasters, and for preventing disasters, abuses and system problems. KÜRT’s information management division is one of the key players in the Hungarian market, and benefits from the experience it has gained from literally hundreds of successfully completed IT security projects. The company’s incident management team boasts unique expertise and a range of in-house developed solutions in ethical hacking, log analysis and network investigation.

KÜRT’s service portfolio has earned it considerable success the world over. Their data recovery know-how was purchased by the government of Vietnam and of Egypt, and their IT security services are used by clients in many countries, from the EU to the Middle East.

KÜRT has been profitable since its inception. It is owned by Hungarian private individuals. The company’s professional work, HR policy and CSR activities have earned them numerous professional awards both in Hungary and abroad.

Log and Event Analysis

Log and event analysis monitors the processes taking place in the IT systems, analyses them in their particular context, then compiles reports on the results and makes recommendations regarding solutions.

The problem with classic log analysis is that the events not recorded in logs are not registered at all, and therefore they are not processed either, which means that many incidents remain undetected due to a lack of information. Under KÜRT’s methodology the source data for log and event analysis is provided not only by the log files, but also by the system monitoring tools through the intrusion detection (IDS/IPS), the database and application audit systems, which makes for considerably more accurate and comprehensive analysis and incident management.

The company monitors the events generated by these systems and compare them in the same timeframe. If they identify a conspicuous incident based on a comparison of the events, they analyse it and include the result in the report.

Digital Forensic Examination

The number of computer-related abuses is rising alarmingly in both the private and the public sectors. Such attacks give rise to massive financial and reputational damage, and can even have a devastating effect on exceptionally stable global brands though to have an unshakeable financial background.

Investigating the circumstances of such attacks, and revealing the factors and systemic problems that facilitate them is in the fundamental interest of corporate managers, in the interest of avoiding further problems.

KÜRT’s Digital Forensic Examination serves to detect crimes and abuses committed against IT systems in the course of their operation, or to reconstruct them after the event. For the purpose of their examination the company uses its market-leading data rescue, ethical hacking, log analysis and incident management methodologies. KÜRT’s experts reconstruct the circumstances of the occurred incident chronologically and also provide evidence regarding the details of the events underlying the incident.

Production Continuity Planning (PCP)

Companies cannot afford to let their standard business operations fail for significant periods of time, and moreover, as the level of technological development increases and the competitive environment intensifies, the length of disruptions in business continuity that can be sustained without suffering significant business loss is becoming shorter and shorter.

Maintaining business continuity does not simply happen by itself: the only companies that can reduce the potentially high risks emanating from such disruptions are those that have an adequate, general business continuity strategy, and have developed the appropriate procedures based on it. The business continuity strategy should ideally address all areas where failure could cause significant damages and operational problems for the company, and might endanger fulfilment of the company’s strategic objectives.

Since nearly all important processes at the business departments of large corporations are now built on IT hardware and services, IT Business Continuity Planning (ITBCP) is increasingly taking on a leading role within general business continuity planning, and it is frequently the analyses and plans made in this area that provide the basis for extending business continuity planning to the business departments.

More and more companies engaged in production however, recognise that the desired level of business continuity cannot be established without ensuring the continuity of value-creation processes and the supply chain, which includes both the processes that are supported by IT, and the fundamental processes that are not IT-based.

The methodology of production continuity planning is essentially the same as that employed in the general BCM project; in other words it has as its core the analyses developed from the systematic steps mentioned above, and the risk analysis measures that are built on these. Due to the special characteristics of production systems, however, KÜRT’s specialists have had to carry out major methodological developments in the following areas:

New threat factors
Because of the special environments, systems and resources, a new group of threats has to be confronted in comparison to the environments of office or business processes (e.g. an industrial environment, chemicals, constant exposure to liquids, high voltage electrical systems, mechanical impacts, etc.).

Significantly greater resource set
Extending business impact analyses to the entire production process, as opposed to just the business environment, requires the review and handling of a significantly greater number and variety of resources (industrial PCs, production control PLCs, pumps, motors, conveyors, sensors, connectors, etc.).

New processes
Extended to the production processes, the methodology must also contend with numerous new processes. These need not only be information processes, but could also be physical processes, the input/output of which may not only be data, but also a tangible, physical product or even a service.

SeCube ISMS

KÜRT – drawing on its experience of real-life projects, and the requirements of both domestic and international customers – has developed SeCube ISMS for organisations that want to consciously manage the risks threatening their business processes, and wish to minimise both the likelihood and the potential impact of a disaster.

The modular software system supports the following information security processes and activities:
• The effective period execution of operational risk analysis processes, and of the Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) processes aimed at risk management
• Coordinating and monitoring execution of the above processes throughout their life-cycles
• Generating, storing, indexing and managing the documentation resulting from the processes

With algorithmic support for the above methodologies, including the application of information technology and graph theory, we offer an effective alternative to previously used manual (or those supported only with Microsoft Office tools), which raises the protection of business processes to an unprecedented level of quality.

SeCube is available in flexible licensing packages, which can be configured to suit customers’individual requirements (own license, software rental or SaaS service).

KURT Information Management

  • Rétköz u. 5. H-1118, Budapest, Hungary
  • +36 1 424 6666 
  • +36 1 228 5414 
Add to favorites