IT security Security consulting, auditing, penetration testing. Security research, hardware. Data acquisition and analysis Data acquisition from publicly available sources, data analysis services and development of analytics software. Outsourcing System and network administration and monitoring, problem solving, RFID, access control systems.