image

OUR SERVICES

At COSEINC,
we are a highly focused company that will only deliver on our core-competency and with the highest of standards and professionalism. In doing so, we hope that we will be able to help our clients to minimize their risks in their information technology investment, avert any disaster that can arise from these risks and consequently, maximize their returns on such investments.

At COSEINC,
we are a highly focused company that will only deliver on our core-competency and with the highest of standards and professionalism. In doing so, we hope that we will be able to help our clients to minimize their risks in their information technology investment, avert any disaster that can arise from these risks and consequently, maximize their returns on such investments.

research

COSEINC has a dedicated team of researchers that carry out cutting edge research in the field of computer security.

consulting

Besides our research expertise, we also offer to our clients various highly specialised security consulting services

education

We offer a series of in-depth technical courses. Some of these courses are developed by and taught by our researchers

RESEARCH

COSEINC has a dedicated team of researchers that carry out cutting edge research in the field of computer security. Our researchers are the best in their research fields and are highly well known figures in the community.


We specialise in the following area of research:

  • Virtualization security
  • Mobile security
  • Kernel security

We can provide our clients either with dedicated and on-going security research services or one-time off customized research services.

CONSULTING

Besides our research expertise, we also offer to our clients various highly specialised security consulting services, which includes areas such as:

  • Source Code Auditing
  • Malware Analysis
  • Penetration Testing
  • Product Security Assessment

EDUCATION

We offer a series of in-depth technical courses. Some of these courses are developed by and taught by our researchers while other courses are conducted in collaboration with well-known security experts in the industry.