Services
Independent assessments, incident support, and recovery verification — across networks, wireless and signal environments. Evidence your auditors, insurers, and boards can rely on.
Discuss Your NeedsFamily 01 · During & after an incident
Investigate disruption. Verify recovery. Prove what remains. Most incidents don't end when the service is restored — they end when the risk is removed and you can prove it.
Use it during a suspected or active incident
Gives your responders an extra view of what is communicating across the environment — surfacing unusual activity, unwanted connections, affected systems, and operational exposure while the incident is still unfolding.
Use it after containment or remediation
Independently verifies the clean-up actually worked — no leftover unwanted connections, no rogue devices, no hidden paths back in.
A real case
A manufacturer believed a ransomware incident was fully contained after a five-day recovery. A follow-up check found a small cellular modem on the plant floor still calling out to an unknown destination — overlooked because it sat outside the corporate network.
Family 02 · Decision-moment evidence
Before the audit, the insurance renewal, the board paper, or the deal — know what's actually connected, what's communicating, and what's exposed. Each service is built for a specific decision moment.
Establish the picture
A point-in-time map of what's connected, what's exposed, what's controlled, and where the real business risk sits.
Show readiness
An on-site readiness assessment against the regulatory, audit, or internal frameworks you're being measured on.
Capture a defensible snapshot
A dated cyber-visibility snapshot for board reviews, M&A diligence, insurance evidence, or any decision window.
Talk to your insurer or broker
A scored, evidence-backed posture view for underwriting, renewal, valuation, or board reporting.
A real case
In pre-acquisition diligence, we found a hidden third-party maintenance link with permanent remote access into a target's production environment — undocumented, unmonitored, and material enough to reshape deal terms.
Family 03 · Signal-level evidence
See what's broadcasting, who's listening, and where your signals reach. A site can pass every IT and physical-security audit, and still leak signals across the fence line, host an unauthorised wireless device, or rely on a satellite signal that can be quietly jammed or faked.
Site-level wireless & radio risk
Checks corporate Wi-Fi, industrial wireless, cellular activity, short-range radios, interference, unwanted connectivity, perimeter signal exposure, and overall wireless security.
Independent baseline incl. GNSS
An independent audit of your radio environment and satellite-navigation integrity — for resilience, regulatory, insurance, board, or critical-infrastructure evidence.
What you receive
Each engagement is tailored to your decision moment, but every engagement produces evidence your executives, risk teams, auditors, insurers, or stakeholders can actually use.
Plain-language executive summary
Current-state risk and exposure view
Evidence-backed findings — not opinions
Control and readiness gap analysis
Observations on undocumented or unwanted connectivity
Wireless / radio / satellite-navigation findings (where in scope)
Prioritised remediation and improvement roadmap
Reporting appendix tailored to your framework or audience
Standards & frameworks
The same engagement can serve multiple reporting needs. We map findings to whichever standards your auditors, regulators, insurers, or boards care about.
Enterprise & risk
ISO 27001 · ISO 27005 · NIST CSF · NIST RMF
Industrial / OT
IEC 62443 · zone & conduit evidence
Financial / payments
APRA CPS 234 · SAMA CSF · PCI DSS
Middle East
NCA ECC · CSCC · OTCC · UAE NESA · Qatar NCSP
AI governance
ISO/IEC 42001 · NIST AI RMF · EU AI Act evidence
Plus your own
Internal board, audit, insurer questionnaires, and internal incident-response / recovery requirements. Cydalics provides the assessment and the evidence. Certified bodies, auditors, regulators, and underwriters remain responsible for formal certification, attestation, and underwriting decisions.
Powered by the platform
Every service is delivered using the same Cy-Mind platform that runs in your environment — Cy-Mind RF for the signal layer, Cy-Mind IP for network communications, and Cy-Mind AI for agentic workflows. On-site, customer-controlled, and fully offline deployments are supported, so sensitive operational information never has to leave your control.
Cydalics is shaped by the rigorous security, compliance, and regulatory regimes of Australia and Switzerland — and brings that discipline to engagements in-region.
Tell us which decision is in front of you. We'll suggest the right service, scope an engagement, and outline the evidence you'll have at the end.
Discuss Your Needs