Loading...

As a corporation based on defence and security, R V Connex has a wide variety of security solutions to offer across a number of domains to meet the challenge at hand; encompassing a number of areas such as Cyber Security, Intelligent Operations Center (IOC), EOD Robots and Anti-Drone Solutions.
The IOC is an automated solution to help support and streamline security operations for critical infrastructure and its personnel via integration of various sensors for effective and speedy control, management, data analysis and processing under one single platform. We also have expertise in designing and manufacturing EOD Robots for sensitive and high-risk operations where time and safety is of the essence, as well as tailored Anti-Drone Solutions to respond to the new wave of unmanned threats facing modern security.

  • Cyber Security
  • Information Security
  • Intelligent Operations Center (IOC)
  • EOD Robots
  • Anti-Drone

CYBER DEFENSE

We offer consultation, training, handling real-life threats, system vulnerability evaluation, surveillance and espionage and cyber operations. Our capabilities include cyber defense design and development to meet requirements for national defense and security.

National Cyber Defense requires national Cybersecurity expertise and solutions. R V Connex brings the most advanced Cyber Defense Solutions and services to secure Thailand’s Cyberspace.
Cybersecurity Consulting
  • Cybersecurity Master Plan Development
  • Cybersecurity Deployment
  • Cybersecurity Program Assessment
  • ISO27001 Implementation
  • BCM Consulting
  • GDPR Consulting
Cybersecurity Consulting
  • Incident Response Plan Development
  • Incident Response Readiness Assessment
  • Incident Response Services
  • Digital Forensics Investigation
  • Compromise Assessment
Cyber Operation Center Services
  • Cyber Operation Center Development
  • Cyber Operation Center Operations
Cybersecurity Assessment
  • Vulnerability Assessment
  • Penetration Testing
  • Combat System Security Assessment
  • OT Security Assessment
Training
  • Cybersecurity Training Roadmap Development
  • Cybersecurity Training Consulting
  • Cybersecurity Training Courses
  • Cybersecurity Exercises
State-of-the-Art Technology
  • Design unique systems tailored to each particular user
  • System customization jointly with user
Cyber Systems Development and Integration
  • Enterprise Systems Integration
  • Tactical Systems Integration
  • Cyber Systems Integration
Managed Cybersecurity Services
  • Managed Detection and Response
  • Managed Cyber Threat Intelligence
  • Managed Cloud Security

CISSPCISSP

CISACISA

CISMCISM

GIAC GISFGIAC GISF

GIAC GSECGIAC GSEC

GIAC GCIHGIAC GCIH

GIAC GCIAGIAC GCIA

GIAC GMONGIAC GMON

GIAC GCFAGIAC GCFA

GIAC GCFEGIAC GCFE

GIAC GPENGIAC GPEN

GIAC GWAPTGIAC GWAPT

CCISOCCISO

ECSAECSA

CEHCEH

CHFICHFI

ECESECES

ENSAENSA

CSCUCSCU

CEICEI

SECURITYSECURITY +

IRCA ISO27001 PAIRCA ISO27001 PA

PECB ISO27001 PIPECB ISO27001 PI

PECB ISO22301 PIPECB ISO22301 PI

PECB ISO31000 RMPECB ISO31000 RM

ITILv3 FoundationITILv3 Foundation

CCNACCNA

CCNACCNA Security

CCNPCCNP

MCS, MCP, MCSA, MCSDMCS, MCP, MCSA, MCSD