The Challenge


"Our services help our customers to save time and money on access right reviews, we're the CISO's best friend"

Tamas MIHALY, President

 

SCROLL DOWN

The Challenge


"Our services help our customers to save time and money on access right reviews, we're the CISO's best friend"

Tamas MIHALY, President

 

accesses.jpg

The Challenge

Establishing an effective and reliable cyber defense program requires a strong foundation of internal controls. Today, cyber criminals influence employees via social engineering to unwittingly assist in malicious activity. Adversaries target employees with privileged accounts in the enterprise architecture. Because user roles are dynamic in a modern enterprise, identity, role and access management are key elements of any daily IT security routine. If the role of an employee changes a review of existing access rights should be part of the administrative change procedures, otherwise inappropriately-assigned access rights begin to accrue inside the architecture, creating layers of vulnerabilities for bad actors to manipulate.

Our Solution


OUR SOLUTION

Our Solution


OUR SOLUTION

Using our proprietary technology XS Matrix collects and analyzes anonymized employee and access rights data. The XS Risk Engine automatically assigns prioritized risk scores and our customers receive a detailed report identifying vulnerabilities and recommended actions to address and mitigate them. With this tailored report, customers can address the greatest risks first—ensuring that resource allocation decisions are optimized to quickly deliver the largest threat reduction in the least amount of time.

We use Access Control Risk Specialists on-site to assist in all phases of the assessment process:interviews, data collection and analysis and risk mitigation planning and execution. A follow-up assessment is conducted to ensure successful risk mitigation and to support a proactive approach to emergent threats. Subsequent periodic access rights reviews based on XS Matrix’s risk-based assessment allow our customers to visualize risk level changes measure-by-measure and report risk reduction progress to key stakeholders.

Our Mission


OUR MISSION

Our Mission


OUR MISSION

IN OUR AGE, ACCESS CONTROL COMPLIANCE SHOULD NOT BE A TOPIC FOR LARGE COMPANIES ONLY!

HERE AT XS MATRIX WE BELIEVE, THAT THE UNDERLYING TECHNOLOGY SHOULD BE ACCESSABLE AND AFFORDABLE TO ALL COMPANIES.


OUR MISSION IS:

TO ENABLE OUR CUSTOMERS TO PROTECT THEIR SENSITIVE INFORMATION BY PROVIDING STATE-OF-THE-ART RISK ASSESSMENT AND MANAGEMENT SERVICES FOCUSED ON USER ACCESS RIGHTS AND ACCOUNT PERMISSIONS. OUR SOLUTIONS ARE CHARACTERIZED BY FLEXIBILITY, RESPONSIVENESS AND COMPETITIVENESS AND WILL ALWAYS REPRESENT THE LEADING-EDGE IN THE CYBER SECURITY INDUSTRY.


Services


OUR SERVICES

Services


OUR SERVICES

 

About US:

XS Matrix Security Solutions uses a proprietary risk-based access control technology and embedded Segregation of Duties (SoD) intelligence to provide state-of-the-art enterprise architecture risk assessment and risk management services focused on user access rights and accounts.

XS Matrix is headquartered in Budapest, Hungary where we maintain our technical and management functions. Forward facing Risk Specialists are positioned in Europe and the US to support our customers and partners.

ACCESS CONTROL RISK ASSESSMENT SERVICES FOR:

  1. Business Application Layer: e.g. SAP ERP
  2. Database Layer: e.g. Oracle Database, MS SQL Database
  3. Middleware Layer: e.g. IBM MQ
  4. Operating System Layer: e.g. Active Directory, Windows Servers, LDAP, AIX Servers, Linux Servers
  5. Virtualization Layer: e.g. VMWare, vSphere, vSphere with Operation Management
 
 

Our Team


MEET THE TEAM

Our Team


MEET THE TEAM

 

Our Leadership Team

 

 
tamas_mihaly_xsmatrix-1.jpg

Tamás Mihály

President and Co-Founder, CISA, CISM

Tamás holds a Masters in Finance with an emphasis in Information Systems. Tamás has over a decade of experience in the financial sector as Chief Information Security Officer (CISO) specializing in internal fraud prevention, data leaks and access rights monitoring.

Harold Teasdale

Vice President and Co-Founder, CISA, CISM

Harold holds a degree in Finance and 17 years’ experience in cybersecurity including 11 years as Managing Director in Hungary and Slovenia for Symantec—one of the world’s foremost cyber security service providers.

gyenese_peter_xsmatrix.jpg

Peter Gyenese

Director of Business Development

Peter is the former Channel Leader of IBM Security Systems for Central and Eastern Europe. Previously he worked in numerous IT security related positions over the past decade including CompTIA Security+ Certified Pre-Sales Engineer.

The Extended Team


EXTENDED TEAM

The Extended Team


EXTENDED TEAM

OUR ACCESS CONTROL RISK SPECIALISTS

All our Access Control Risk Specialists have at least 10 years’ experience in cyber security. Cyber Security is one of the most dynamic, complex and challenging fields in information management. Deep understanding in a narrow range is not enough. To be effective you need comprehensive understanding of the industry combined with the practical experience required to understand our customer’s problems. At XS Matrix our specialists help customers create effective information protection strategies that provide security without sacrificing usability.

What can you expect from our crew:

  • Responsive and customer-focused support
  • Results: Driving risk as close to zero as possible
  • Extensive knowledge in Identity Management (IDM) and Separation of Duties (SoD)
  • Expertise in frameworks, regulations and industry best practices (ISO27001/2, COBIT)
  • Industry-standard certifications (CISA, CISM, CGEIT)
  • A commitment to our customers and partners–we stay engaged to help you anticipate and address an always changing data security environment

 

 

    Why Choose Us?


    WHY CHOOSE US?

    Why Choose Us?


    WHY CHOOSE US?

     

    VALUE
    Superior, customer-focused solutions and a competitive price

    CAPABILITY
    We provide comprehensive, multi-layered Access Rights audits.

    EFFICIENT
    Automated collection, analysis and risk assessment dramatically reduces the time and resources needed for Access Rights Reviews.

    EFFECTIVE
    Our solutions help you prioritize risks to meet your compliance and internal control requirements.

    INTELLIGENT
    The embedded XS Matrix Separation of Duties (SoD) intelligence engine is the result of a more than ten years of development. We’ve mastered the “least privilege rule” to automatically eliminate conflicting rights in account privilege settings.