COG TecSol

 

2025 Services Menu

Filter by tag: advanced security, AI, analysis, artifical intelligence, audits, automation, backup, break glass, communication, computing, contingency, customer favorites, disaster recovery, electrical engineering, encryption, enterprise, estate, financial, government, hardware, high availability, information, infrastructure, intelligence, legal, LLM, military, network, networking, networks, operations, personal, privacy, proprietary, security, services, SMB, software, specialty, theory, transaction, trust, workflows, ALL

 

Filtering for security.

ServiceDescriptionContract LengthStarting PriceTags
Secure message depositry archiveSecure message depositry archive: we will securely store any data sent through text message sent to a dedicated bot number.

1 - 99 year$1K MRCcontingency, security, break glass, communication
Secure social media file depositorySecure social media file handoff: we will securely store any data sent through instant message to a social media bot contact. The method to retrieve the data can be simple or engineered with advanced security requirements, per your specifications (additional NRC).

1 - 10 yearFrom $2K MRC + $5K NRCcontingency, security, break glass, communication
MFA BackupSecurely back up your MFA QR/key codes. Optionally, we will restore them to a new phone and courier it to you upon request.

1 - 99 year$1K MRCcontingency, backup, disaster recovery, security, estate, trust
SFTP drop box media triggerReceive a DVD or USB drive to a default or later specified address after uploading content to a secure SFTP drop box

1 - 99 year$5K/ycontingency, security, automation, workflows, estate, trust
Secure VDIWe will work with you to craft the ultimate VDI infrastructure, prioritizing your company's specific needs and concerns.

1 - 99 year$50K NRCpersonal, SMB, enterprise, government, security, workflows, computing, infrastructure
Secure idemnity storageWe will store provided information privately, including the date it was received upon, until a person or entity with the specified ID or authentication process verifies with us to retrieve it.

1 - 99 year$10K NRCpersonal, SMB, enterprise, government, security, backup, security
Secure end-to-end networkWe will develop an ultra highly available, secure network that interconnects with your branches, significant peers, cloud services and infrastructure, optionally with a complete chain of physical network custody through the use of dark fiber backhaul links. VPN based on end-to-end connectivity to critical peers using a combination of on-net and off-net technologies for unbreakable and extremely secure HA. In consideration to security over performance, we may optionally make use of proprietary encryption technologies with multiple layers of encryption. This service makes use of multiple technologies including Cloud interconnect services, Enterprise Peplink VPN routers, nearby datacenters, tunnel/site-to-site link to nearby static routes with various other critical peers.

2 - 10 year$250K - $2M/ySMB, enterprise, government, security, infrastructure, network, advanced security, proprietary, encryption
Proprietary operating systems and softwareWe will license and support our in-house operating system, based on a derrivative of the Linux kernel, to you. This is the ultimate strategy to avoid security incidents, by having never before seen software unknown to the attacker. The operating system is compiled from scratch with all major components changed out (e.g. rename root, sudo). Additional hardening and customizations will be performed as part of the contract, based on your use case.

1 - 10 year$1M/yenterprise, government, security, infrastructure, software, advanced security, proprietary
Proprietary encryption library substitutionWe will compile your software with never before seen, proprietary encryption libraries. Depending upon your performance requirements, we will base the encryption scheme on a combination of modified existing and new encryption tecnologies. This makes the effort of cracking the combined algorithm extremely expensive and theoertically impossible to decipher within the realm of reality.

Per project, with optional support contracts.$1M NRCenterprise, government, security, infrastructure, encryption, advanced security, proprietary
PCI DSS preparationWe will prepare your organization and infrastructure to pass a PCI DSS audit. This contract can be combined with the SOC 2/3 audit preparation service at a discounted rate. We know that sometimes it's a little bit boring, but it's necessary and it keeps the financial sytem secure!

Per project, with optional support contracts.$50K NRCSMB, enterprise, government, security, infrastructure, audits, customer favorites
SOC 2/3 preparationWe will prepare your organization and infrastructure to pass a SOC 2/3 audit. This contract can be combined with the PCI DSS audit preparation service at a discounted rate.

Per project, with optional support contracts.$50K NRCSMB, enterprise, government, security, infrastructure, audits
ISO 27001 preparationWe will prepare your organization and infrastructure to meet ISO/IEC 27001 information security management systems (ISMS) requirements.

Per project, with optional support contracts.$100K NRCSMB, enterprise, government, security, infrastructure, audits
HIPPA complianceWe will prepare your infrastructure to meet HIPPA requirements.

Per project, with optional support contracts.$100K NRCSMB, enterprise, government, security, infrastructure, audits
Encrypted internal email (PGP based)We will design and host a cost effective secure email message service for internal use.

2 - 5 year$5K MRCpersonal, SMB, enterprise, government, security, communication, workflows
Highly secure, encrypted inter-organizational email (PGP based)We will design and host a cost effective secure email message service for internal use, making use of private VPN communication paths between organizations.

2 - 5 year$10K MRCpersonal, SMB, enterprise, government, security, communication, workflows
Security assessmentWe will perform a high level review of your infrastructure, software and configurations with consideration to security.

Per project$50K NRCSMB, enterprise, government, security, audits, infrastructure, financial
BIOS firmware hardening/Long term hardware supportWe will reverse engineer or obtain the original source code for a BIOS chipset, assess the firmware and modify it to support various security enhancements.

Per project$175KSMB, enterprise, government, military, security, infrastructure, advanced security
Extreme deep dive security analysisWe will perform an extreme deep dive analysis of your software, infrastructure and personnel. If we cannot find sufficient vulnerabilities to justify the consulting fees, we will provide a refund. $1M for database dump, $250K per high level CVE or PCI/PII information disclosure, $10K per bug, $5K per remediation, $1K per insecure device/configuration. Refund if no usable findings. Retainer amount depending on the size of the network.

Per project$100K - $1M NRCSMB, enterprise, government, security, audits, infrastructure, financial
Vulnerability/code monitoringWe will monitor your code base, operating system, software and software packages for CVEs and notify you.

1 - 5 year terms$2K MRCSMB, enterprise, government, security, audits, infrastructure, financial, customer favorites
Application optimizationWe will optimize your application run time, internal application workflows, package size and memory leaks.

Per project$20K NRCSMB, enterprise, government, security, infrastructure, customer favorites
Software obfuscationWe will obfuscate the source code of your application and make it practically impossible to reverse engineer.

Per project$20K NRCSMB, enterprise, government, security, infrastructure, customer favorites
Payment processing infrastructureWe will provide experience from seasoned professionals to consult regarding regulated payment processing infrastructure.

Per project$50K NRCSMB, enterprise, government, security, infrastructure, financial
Secure air gapped system consultingWe will design an air gapped computing infrastructure for your most critical security needs in extreme situations. We will make use of proven technologies including faraday cages, isolated atomic clocks, rotary generator electrical isolation, fiber optic based displays and optional proprietary intermediary query exchange microcontrollers.

Per projectFrom $50K NRCenterprise, government, infrastructure, security, electrical engineering, computing, theory, advanced security, military, hardware
Generic Windows, Linux, RHEL, CentOS, Stream, Ubuntu, MySQL, IT consultingWe will provide our expertise in any situation.

Per project, with base retainerFrom $250/hSMB, enterprise, government, infrastructure, security, computing, customer favorites
SaaS VDI Web RelaySupport your legacy application with a strong degree of separation between the public Internet and human user interfaces. Your clients will be able to access user interface elements generated from a secure environment without directly interfacing with your application. This technology is based on an HTML5 VNC-like client to access a web browser in a heavily locked down ephemeral Docker container with only local network access to the application. This effectively allows only viewing and inputting clicks or keyboard strokes to the application, without giving the access or tools necessary to probe, scan or otherwise hack the site.

3 - 15 year$2K MRC + $5K NRCSMB, enterprise, government, security, workflows, computing, infrastructure
Enterprise API serviceWe will develop and operate a production grade API for your application or end users.

2 - 10 year$2K MRC + $50K NRCSMB, enterprise, government, security, workflows, computing, infrastructure, software
Proprietary software for banksWe will develop, operate and maintain a secure, high performance banking system platform while complying with various audit requirements in the applicable region(s) of operation.

10 - 25 yearFrom $2M/yenterprise, security, workflows, computing, financial, software
User auditing serviceWe will develop software to automatically generate a report of all users with access to your infrastructure and services in your organization. You might be interested to know who logged in last and where.

2 - 25 year$20K NRC/$3K MRC supportnetworks, infrastructure, specialty, customer favorites, security, audits

 

© 2003 - 2025 Consolidated Operations Group Technology Solutions S.A.