Cydalics CYDALICS

Services

Eight services.
Three decisions.

Independent assessments, incident support, and recovery verification — across networks, wireless and signal environments. Evidence your auditors, insurers, and boards can rely on.

Discuss Your Needs

Family 01

Incident & Recovery Verification

Cy-IncidentSight · Cy-RecoveryCheck

Family 02

Operations Risk & Evidence

Cy-RiskScape · Cy-CyberCheck · Cy-CyberSight · Cy-CyberSure

Family 03

Wireless & Signal Resilience

Cy-Wireless Assessment · Cy-SpectrumSure

Family 01 · During & after an incident

Incident & Recovery Verification

Investigate disruption. Verify recovery. Prove what remains. Most incidents don't end when the service is restored — they end when the risk is removed and you can prove it.

Use it during a suspected or active incident

Cy-IncidentSight

Gives your responders an extra view of what is communicating across the environment — surfacing unusual activity, unwanted connections, affected systems, and operational exposure while the incident is still unfolding.

Unexpected connections, unusual data flows, remote-access paths
Devices that reappear after being removed, hidden cellular modems, rogue transmitters
Plain-language business impact and prioritisation

Use it after containment or remediation

Cy-RecoveryCheck

Independently verifies the clean-up actually worked — no leftover unwanted connections, no rogue devices, no hidden paths back in.

Post-remediation verification report
Wireless / signal-level findings where in scope
Evidence appendix for board, insurer, regulators, auditors

A real case

A manufacturer believed a ransomware incident was fully contained after a five-day recovery. A follow-up check found a small cellular modem on the plant floor still calling out to an unknown destination — overlooked because it sat outside the corporate network.

Family 02 · Decision-moment evidence

Operations Risk & Evidence

Before the audit, the insurance renewal, the board paper, or the deal — know what's actually connected, what's communicating, and what's exposed. Each service is built for a specific decision moment.

Establish the picture

Cy-RiskScape

A point-in-time map of what's connected, what's exposed, what's controlled, and where the real business risk sits.

Show readiness

Cy-CyberCheck

An on-site readiness assessment against the regulatory, audit, or internal frameworks you're being measured on.

Capture a defensible snapshot

Cy-CyberSight

A dated cyber-visibility snapshot for board reviews, M&A diligence, insurance evidence, or any decision window.

Talk to your insurer or broker

Cy-CyberSure

A scored, evidence-backed posture view for underwriting, renewal, valuation, or board reporting.

A real case

In pre-acquisition diligence, we found a hidden third-party maintenance link with permanent remote access into a target's production environment — undocumented, unmonitored, and material enough to reshape deal terms.

Family 03 · Signal-level evidence

Wireless, Radio & Satellite-Navigation Resilience

See what's broadcasting, who's listening, and where your signals reach. A site can pass every IT and physical-security audit, and still leak signals across the fence line, host an unauthorised wireless device, or rely on a satellite signal that can be quietly jammed or faked.

Site-level wireless & radio risk

Cy-Wireless Assessment

Checks corporate Wi-Fi, industrial wireless, cellular activity, short-range radios, interference, unwanted connectivity, perimeter signal exposure, and overall wireless security.

Rogue Wi-Fi, hidden cellular modems, unauthorised wireless backdoors
Perimeter signal exposure — what your signals reveal outside the fence line
Shielding and containment effectiveness for secure zones

Independent baseline incl. GNSS

Cy-SpectrumSure

An independent audit of your radio environment and satellite-navigation integrity — for resilience, regulatory, insurance, board, or critical-infrastructure evidence.

Radio-environment baseline and change tracking
Satellite-navigation jamming, spoofing, and timing/positioning resilience
Interference, congestion, unexpected emitters

What you receive

Practical, written outputs.

Each engagement is tailored to your decision moment, but every engagement produces evidence your executives, risk teams, auditors, insurers, or stakeholders can actually use.

Plain-language executive summary

Current-state risk and exposure view

Evidence-backed findings — not opinions

Control and readiness gap analysis

Observations on undocumented or unwanted connectivity

Wireless / radio / satellite-navigation findings (where in scope)

Prioritised remediation and improvement roadmap

Reporting appendix tailored to your framework or audience

Standards & frameworks

Map findings to the standards that matter to you.

The same engagement can serve multiple reporting needs. We map findings to whichever standards your auditors, regulators, insurers, or boards care about.

Enterprise & risk

ISO 27001 · ISO 27005 · NIST CSF · NIST RMF

Industrial / OT

IEC 62443 · zone & conduit evidence

Financial / payments

APRA CPS 234 · SAMA CSF · PCI DSS

Middle East

NCA ECC · CSCC · OTCC · UAE NESA · Qatar NCSP

AI governance

ISO/IEC 42001 · NIST AI RMF · EU AI Act evidence

Plus your own

Internal board, audit, insurer questionnaires, and internal incident-response / recovery requirements. Cydalics provides the assessment and the evidence. Certified bodies, auditors, regulators, and underwriters remain responsible for formal certification, attestation, and underwriting decisions.

Powered by the platform

Services run on Cy-Mind. Your data stays with you.

Every service is delivered using the same Cy-Mind platform that runs in your environment — Cy-Mind RF for the signal layer, Cy-Mind IP for network communications, and Cy-Mind AI for agentic workflows. On-site, customer-controlled, and fully offline deployments are supported, so sensitive operational information never has to leave your control.

Cydalics is shaped by the rigorous security, compliance, and regulatory regimes of Australia and Switzerland — and brings that discipline to engagements in-region.

A simple next step.

Tell us which decision is in front of you. We'll suggest the right service, scope an engagement, and outline the evidence you'll have at the end.

Discuss Your Needs