Tactical Network Solutions

www.tacnetsol.com

Are you concerned about risky, vulnerable embedded firmware in IoT devices, connected medical devices, automotive ECUs and industrial control systems? You're not alone. Since 2007, Fortune 500 companies and governments around the world have sought out Tactical Network Solutions for reverse engineering training programs, firmware evaluations, and cyber risk mitigation strategies. Clients are excited to leverage our automated firmware evaluations and consulting performed with the proprietary Centrifuge IoT Security Platform. The evals are completed with NO access to source code on images containing a Linux-based root filesystem compiled for either MIPS, ARM, or X86. We also support QNX (a real-time operating system) and Docker containers. TNS evaluations have revealed thousands of hidden attack vectors including erroneously placed private crypto keys, insecure binaries with highly vulnerable function calls and other rampant security holes on embedded firmware. Our community of clients includes firmware developers, underwriters, law firms, governments and intelligence agencies worldwide who share a common goal: to discover hidden attack vectors in IoT and connected devices.

Read more

Reach decision makers at Tactical Network Solutions

Lusha Magic

Free credit every month!

Are you concerned about risky, vulnerable embedded firmware in IoT devices, connected medical devices, automotive ECUs and industrial control systems? You're not alone. Since 2007, Fortune 500 companies and governments around the world have sought out Tactical Network Solutions for reverse engineering training programs, firmware evaluations, and cyber risk mitigation strategies. Clients are excited to leverage our automated firmware evaluations and consulting performed with the proprietary Centrifuge IoT Security Platform. The evals are completed with NO access to source code on images containing a Linux-based root filesystem compiled for either MIPS, ARM, or X86. We also support QNX (a real-time operating system) and Docker containers. TNS evaluations have revealed thousands of hidden attack vectors including erroneously placed private crypto keys, insecure binaries with highly vulnerable function calls and other rampant security holes on embedded firmware. Our community of clients includes firmware developers, underwriters, law firms, governments and intelligence agencies worldwide who share a common goal: to discover hidden attack vectors in IoT and connected devices.

Read more
icon

Country

icon

State

Maryland

icon

City (Headquarters)

Columbia

icon

Employees

11-50

icon

Founded

2007

icon

Estimated Revenue

$5,000,000 to $10,000,000

icon

Social

  • icon

Employees statistics

View all employees

Potential Decision Makers

  • CNO Developer

    Email ****** @****.com
    Phone (***) ****-****
  • CNO Developer

    Email ****** @****.com
    Phone (***) ****-****
  • Controller

    Email ****** @****.com
    Phone (***) ****-****
  • Security Researcher

    Email ****** @****.com
    Phone (***) ****-****

Technologies

(55)

Reach decision makers at Tactical Network Solutions

Free credits every month!

My account

Sign up now to uncover all the contact details