

GDIS - Cyber Shielding
your most precious assets
The proliferation of computing and telecommunication made our life much more comfortable. in the exact same way it is much easier for criminals and rivals to spy on you.
GDIS is constantly monitoring and mapping the cyber-security risks.
GDIS Matrix
Cyber Challenges

VIP Convoy
Commuting VIPs are mostly vulnerable, due to terror, crime and espionage.
Our escort vehicle is featured with all the electronic means to block transmissions, deactivate roadside bombs, eliminate communication interception, while allowing smooth and seamless connectivity of the VIP and security personnel.




GDIS Cyber Aviator is designed to protect your most valuable assets, especially in such situations.
Our state-of-the-art strategies and solutions for the aviation industry are:
-
Clear Aircraft: Assuring eavesdropping-safe airplane
-
Crypto Communicator: Secured encrypted calls, chats & data
-
Counter Measurements: Technological anti-espionage tools (TSCM)
-
Business Intelligence: Risks analysis with Actionable Intelligence
-
Telecom Hardening: Securing your devices into military-grade resiliency
-
Incident Response: Policies, actions & escalations in crisis situations


Whenever you are gathering for a formal or informal meeting, your rivals are on guard. using modern miniature devices, they can place microphones, bugs, spy-cams and monitor electronic, electromagnetic and voice without even accessing the perimeter.
GDIS solution is ideal for board and executive rooms dealing with classified information.
The system eliminates the eavesdropping risks by:
-
Bug Sweep: from electronics: voice, audio, electromagnetic, recorders and transmitters.
-
Activation of noise blocker.
-
Elimination of any transmission signal from the Room.
It is highly recommended to professionally scan the meeting rooms and surroundings periodically and upon replacement of executives or visits of guests and technicians.
Same service is also applicable for hotel rooms, lounges, conference centers, residencies, planes and yachts.


Usage of cellular communication is part of our daily life. practically all our assets are in the phone or reachable by the device. this concentration of information is facing a major risk such as:
-
Intrusion
-
Hacking
-
Attacking
-
Eavesdropping
-
Manipulation
-
Hostile takeover
GDIS Crypto-Com is the most robust end-to-end encrypted and secured mobile communication.
Crypto-Com is fully proofed against: Jamming, interception, IMSI Catcher, location, remote takeover and physical manipulation.
The phone will shield your valuable assets: voice, chat, SMS and data, using Top-level military standards: Secured and encrypted phones, non-VoIP, with fallback communication via non-cellular networks.
GDIS Crypto-Com has been developed thanks to our in-depth knowledge in counter crypto-warfare, encryption, rugged hardware, telco infrastructure and proprietary cyber technologies.
Ideal for: Heads of States and inner circles, law enforcement, armed forces, Intelligence, taxation and anti-crime/terror/cyber/money laundering agencies, VIPs, Bankers, top accountants and lawyers, multi-nationals, HNWI, celebrities.
-
Cloning
-
Chip-set reading
-
Networks
-
Devices
-
Apps
-
Operating systems
-
Messages (1 & 0 Clicks)

What makes our Crypto Communicator so robust and secured?
6 encrypted layers
-
Hardware
-
Software
-
Firmware
-
Operating System
-
Database
-
GUI
Device Capabilities
-
Full 2G/3G/4G coverage
-
Device to Device & End to End Encryption
-
Narrow bandwidth
Infrastructure
-
Private, Independent Network
-
Baseband Comm. firewall
-
Network overland proof
-
non-VoIP
Shielding
-
Takeover Proof
-
Undetectable
-
Anti-IMSI Catcher

Just like the office, your residencies must be secured, protecting your family members, valuables, assets, documentation and data stored in your home devices.
Hackers may try to identify breeches in your security via the family, smart-home appliances and service personnel that are less aware to the needed level of security.
Therefore, you must order a periodical proper sweeping of the house and vicinity, identify and certify any signal, provide the family and staff with secured tools, passwords and training.


GDIS VIP-Cyber Shield secures Your Most Precious Assets
VIPs today are not safe even at home. You are targeted by criminals, terrorists, kidnappers, ransom seekers, industrial spies, competitors and identity thieves.
You and the family are vulnerable, especially outside your comfort zone, while commuting in chartered jets, yachts, hotels, lounges and third-parties’ locations.
GDIS Cyber-VIP is designed to technologically protect you, your family and most valuable assets in such situations. Our state-of-the-art strategies and solutions for Very Important Persons are:
-
Clear Aircraft: Assuring eavesdropping-safe airplane
-
Crypto Communicator: Secured encrypted calls, chats & data
-
Counter Measurements: Technological anti-espionage tools (TSCM)
-
Business Intelligence: Risks analysis with Actionable Intelligence
-
Telecom Hardening: Securing your devices into military-grade resiliency
-
Incident Response: Policies, actions & escalations in crisis situations


GDIS Forensic Lab is a the most technologically advanced facility, capable of extracting, restoring and retrieving data from virtually any mobile phone, storage device or computer.
This state-of-the-art lab can examine your devices for any malware and spyware, cleanse the equipment and install counter-measurements for future data security.
Our portable equipment can also analyze and detect any spy gear in your own facilities, residences, cars, offices, jets and hotel rooms.
A periodical revision of your devices' cyber-health will keep hackers, spies and criminals away from your valuable assets.
Our lab, is in a secured location and being used by governments, intelligence agencies, corporations and HNVI.
GDIS is committed to grant you the highest peace of mind,
keeping your privacy and confidentiality, anytime, anywhere.



Lt. Col. David Rom,
CEO, GDIS Cyber Intelligence
Your Confidential and Trusted Advisor
Cyber & Electronic warfare Expert:
-
Cyber Crime
-
Cyber Security
-
Cyber Intelligence
-
Technology-based Warfare
IDF senior commander (Res):
-
Cyber
-
Intelligence
-
Technology & Electronic Warfare
-
Elite Forces
Global customers:
-
Governmental, Military
-
International corporations
-
banking, financial
-
telecom, oil, etc.
Highest Accreditations:
-
Electronic engineer, cyber engineer
-
Certified CEH, CISSP, CISM, CCSK, CDPSE CISO, DPO, Crypto & Telecom
-
TSCM - Technical Surveillance Countermeasures