# Cyberkov — Full Bilingual Service Catalog > Kuwait's leading cybersecurity and signal security company since 2012. ISO 27001 / ISO 27701 / ISO 9001 certified. CERT/CMU accredited. Serving governments and enterprises across the GCC region. > النسخة العربية متاحة على: https://cyberkov.com/ar — All pages available in Arabic at https://cyberkov.com/ar/ --- ## Company Overview **Cyberkov Information Technology W.L.L.** is a Kuwait-based cybersecurity and signal security firm established in 2012. The company is the operator of the first CERT (Computer Emergency Response Team) in Kuwait, accredited by Carnegie Mellon University (CERT/CMU). Cyberkov holds ISO/IEC 27001, ISO/IEC 27701, ISO 9001, Cyber Essentials, IASME Cyber Baseline, and MISP certifications. Cyberkov serves government ministries, defense agencies, financial institutions, critical infrastructure operators, and private enterprises across Kuwait, Saudi Arabia, the UAE, Qatar, Bahrain, and Oman. **Headquarters:** Kuwait City, Kuwait **Founded:** 2012 **Emergency Hotline:** +965 22445500 **Email:** info@cyberkov.com **Website (English):** https://cyberkov.com **Website (Arabic):** https://cyberkov.com/ar --- ## Cybersecurity Services **English Hub:** https://cyberkov.com/cybersecurity **Arabic Hub:** https://cyberkov.com/ar/cybersecurity ### Managed Detection & Response (MDR+) **English:** https://cyberkov.com/cybersecurity/mdr **Arabic:** https://cyberkov.com/ar/cybersecurity/mdr Cyberkov's MDR+ service provides 24/7 managed detection and response with real-time threat monitoring, incident response, and threat hunting from dual SOCs in Kuwait and Maryland, USA. **Key Benefits:** - 24/7 Threat Monitoring - Advanced Threat Hunting - Rapid Incident Containment - Real-time Alerting - Threat Intelligence Integration - Automated Response Playbooks - Forensic Investigation - Executive Reporting **Deliverables:** - Monthly Threat Reports - Incident Response Reports - Threat Intelligence Briefings - Executive Security Dashboard - Remediation Guidance - Compliance Evidence Packages --- ### SOC as a Service (SOC+) **English:** https://cyberkov.com/cybersecurity/soc **Arabic:** https://cyberkov.com/ar/cybersecurity/soc Cyberkov's SOC+ delivers continuous security monitoring, SIEM management, threat intelligence integration, and automated incident response for enterprises. **Key Benefits:** - 24/7 Security Operations Center - SIEM Management & Log Analysis - Threat Intelligence Integration - Automated Incident Response - Compliance Monitoring & Reporting - Dedicated Security Analysts **Deliverables:** - Monthly SOC Reports - Incident Response Documentation - Threat Intelligence Briefings - Compliance Evidence Packages - Executive Security Dashboard --- ### Vulnerability Management (VMS+) **English:** https://cyberkov.com/cybersecurity/vms **Arabic:** https://cyberkov.com/ar/cybersecurity/vms Continuous vulnerability scanning, risk-based prioritization, patch management tracking, and security posture improvement for enterprise environments. **Key Benefits:** - Continuous Vulnerability Scanning - Risk-Based Prioritization - Patch Management Tracking - Compliance Monitoring - Security Posture Improvement - Executive Risk Reporting **Deliverables:** - Vulnerability Assessment Reports - Risk Prioritization Matrix - Remediation Roadmap - Compliance Evidence Packages - Executive Dashboard --- ### Insider Threat Management (ITM+) **English:** https://cyberkov.com/cybersecurity/itm **Arabic:** https://cyberkov.com/ar/cybersecurity/itm Behavioral analytics, user activity monitoring, DLP, and privileged access management to detect and prevent insider threats. **Key Benefits:** - Insider Threat Detection - User Behavior Analytics (UBA) - Data Loss Prevention (DLP) - Privileged Access Monitoring - Policy Violation Alerts - Forensic Investigation Support **Deliverables:** - Insider Threat Assessment Reports - User Behavior Analytics Reports - DLP Policy Recommendations - Incident Investigation Reports - Executive Risk Dashboard --- ### Human Risk Management (HRM+) **English:** https://cyberkov.com/cybersecurity/hrm **Arabic:** https://cyberkov.com/ar/cybersecurity/hrm Security awareness training, phishing simulations, human risk scoring, and behavioral change programs to reduce the human attack surface. **Key Benefits:** - Security Awareness Training - Phishing Simulation Campaigns - Human Risk Scoring - Behavioral Change Programs - Compliance Training - Executive Risk Reporting **Deliverables:** - Training Completion Reports - Phishing Simulation Results - Human Risk Score Dashboard - Compliance Evidence Packages - Improvement Recommendations --- ### Professional Services (PS) **English:** https://cyberkov.com/cybersecurity/professional-services **Arabic:** https://cyberkov.com/ar/cybersecurity/professional-services Penetration testing, VAPT, red team operations, source code review, wireless security assessment, and social engineering testing. **Sub-services (English / Arabic):** - [Red Team Operations](https://cyberkov.com/cybersecurity/professional-services/red-team-operations) / [العربية](https://cyberkov.com/ar/cybersecurity/professional-services/red-team-operations) - [Penetration Testing (VAPT)](https://cyberkov.com/cybersecurity/professional-services/penetration-testing) / [العربية](https://cyberkov.com/ar/cybersecurity/professional-services/penetration-testing) - [Source Code Review](https://cyberkov.com/cybersecurity/professional-services/source-code-review) / [العربية](https://cyberkov.com/ar/cybersecurity/professional-services/source-code-review) - [Wireless Security Assessment](https://cyberkov.com/cybersecurity/professional-services/wireless-security) / [العربية](https://cyberkov.com/ar/cybersecurity/professional-services/wireless-security) - [Social Engineering](https://cyberkov.com/cybersecurity/professional-services/social-engineering) / [العربية](https://cyberkov.com/ar/cybersecurity/professional-services/social-engineering) - [ICS/SCADA Security](https://cyberkov.com/cybersecurity/professional-services/ics-scada) / [العربية](https://cyberkov.com/ar/cybersecurity/professional-services/ics-scada) --- ### Special Purpose Services (SPS) **English:** https://cyberkov.com/cybersecurity/special-purpose-services **Arabic:** https://cyberkov.com/ar/cybersecurity/special-purpose-services Advanced specialized security assessments for complex environments including ICS/SCADA, cloud, mobile, and IoT security. --- ### Forensics & Investigative Services (FIS) **English:** https://cyberkov.com/cybersecurity/forensics-investigative-services **Arabic:** https://cyberkov.com/ar/cybersecurity/forensics-investigative-services Digital forensics, incident response, e-discovery, blockchain and cryptocurrency investigation, and legal-grade evidence collection. --- ### Brand Protection (Brand+) **English:** https://cyberkov.com/cybersecurity/brand-protection **Arabic:** https://cyberkov.com/ar/cybersecurity/brand-protection Domain monitoring, anti-phishing, brand impersonation detection, counterfeit product monitoring, and brand abuse takedown. --- ### Defense & Military Cybersecurity **English:** https://cyberkov.com/cybersecurity/defense-and-military **Arabic:** https://cyberkov.com/ar/cybersecurity/defense-and-military Classified systems protection, tactical network security, air-gapped network penetration testing, and national infrastructure cyber defense. --- ## Signal Security Services **English Hub:** https://cyberkov.com/signal-security **Arabic Hub:** https://cyberkov.com/ar/signal-security ### Counter-Espionage Services (CES+) **English:** https://cyberkov.com/signal-security/counter-espionage-services **Arabic:** https://cyberkov.com/ar/signal-security/counter-espionage-services Technical Surveillance Countermeasures (TSCM), bug sweeps, eavesdropping device detection, RF analysis, and covert entry assessment. **Sub-services (English / Arabic):** - [TSCM Surveillance Countermeasures](https://cyberkov.com/signal-security/counter-espionage-services/technical-surveillance-countermeasures) / [العربية](https://cyberkov.com/ar/signal-security/counter-espionage-services/technical-surveillance-countermeasures) - [Counter-Eavesdropping Solutions](https://cyberkov.com/signal-security/counter-espionage-services/counter-eavesdropping-solutions) / [العربية](https://cyberkov.com/ar/signal-security/counter-espionage-services/counter-eavesdropping-solutions) - [Black Team Operations](https://cyberkov.com/signal-security/counter-espionage-services/black-team-operations) / [العربية](https://cyberkov.com/ar/signal-security/counter-espionage-services/black-team-operations) - [Radio Communications Risk Assessment](https://cyberkov.com/signal-security/counter-espionage-services/radio-communications-risk-assessment) / [العربية](https://cyberkov.com/ar/signal-security/counter-espionage-services/radio-communications-risk-assessment) - [Drone & Digital Forensics](https://cyberkov.com/signal-security/counter-espionage-services/drone-digital-forensics) / [العربية](https://cyberkov.com/ar/signal-security/counter-espionage-services/drone-digital-forensics) - [Covert Entry & Lock Picking Assessment](https://cyberkov.com/signal-security/counter-espionage-services/covert-entry-lock-picking) / [العربية](https://cyberkov.com/ar/signal-security/counter-espionage-services/covert-entry-lock-picking) - [Polygraph Testing](https://cyberkov.com/signal-security/counter-espionage-services/polygraph-testing) / [العربية](https://cyberkov.com/ar/signal-security/counter-espionage-services/polygraph-testing) - [Graphology & Handwriting Forensics](https://cyberkov.com/signal-security/counter-espionage-services/graphology-handwriting-forensics) / [العربية](https://cyberkov.com/ar/signal-security/counter-espionage-services/graphology-handwriting-forensics) - [IMSI Catcher Detection](https://cyberkov.com/signal-security/counter-espionage-services/imsi-catcher-detection) / [العربية](https://cyberkov.com/ar/signal-security/counter-espionage-services/imsi-catcher-detection) --- ### Secure Speech Environment (SSES) **English:** https://cyberkov.com/signal-security/sses **Arabic:** https://cyberkov.com/ar/signal-security/sses Acoustic shielding design, secure meeting room certification, and speech privacy assessment for sensitive facilities. --- ### Secure Data Solutions (SDS+) **English:** https://cyberkov.com/signal-security/sds **Arabic:** https://cyberkov.com/ar/signal-security/sds Encrypted communications, secure data transfer, and cryptographic infrastructure for classified and sensitive environments. --- ### Executive Protection Services (EPS+) **English:** https://cyberkov.com/signal-security/eps **Arabic:** https://cyberkov.com/ar/signal-security/eps Personal digital security for executives and VIPs: device hardening, travel security, digital footprint reduction, and surveillance detection. --- ### Secure Key Distribution (SKD+) **English:** https://cyberkov.com/signal-security/skd **Arabic:** https://cyberkov.com/ar/signal-security/skd Cryptographic key management, secure key distribution, and PKI infrastructure for sensitive communications. --- ### Electronic Access Control Security (EACS) **English:** https://cyberkov.com/signal-security/eacs **Arabic:** https://cyberkov.com/ar/signal-security/eacs Physical and electronic access control security assessment, biometric system review, and access control penetration testing. --- ### Counter-Espionage Assessment Program (CEAP) **English:** https://cyberkov.com/signal-security/ceap **Arabic:** https://cyberkov.com/ar/signal-security/ceap Comprehensive espionage risk assessment covering physical, electronic, and human intelligence (HUMINT) vectors. --- ### Defense & Military Signal Security **English:** https://cyberkov.com/signal-security/defense-and-military **Arabic:** https://cyberkov.com/ar/signal-security/defense-and-military Tactical communications protection, RF threat detection, military TSCM, and secure communications for defense and intelligence agencies. --- ## Security Assessments **English Hub:** https://cyberkov.com/security-assessments **Arabic Hub:** https://cyberkov.com/ar/security-assessments Standalone security assessment services (English / Arabic): - [Ransomware Readiness Assessment](https://cyberkov.com/security-assessments/ransomware-readiness) / [العربية](https://cyberkov.com/ar/security-assessments/ransomware-readiness) - [Cloud Security Assessment](https://cyberkov.com/security-assessments/cloud-security) / [العربية](https://cyberkov.com/ar/security-assessments/cloud-security) - [Zero-Trust Readiness Assessment](https://cyberkov.com/security-assessments/zero-trust) / [العربية](https://cyberkov.com/ar/security-assessments/zero-trust) - [AI Image & Deepfake Detection Assessment](https://cyberkov.com/security-assessments/ai-image-deepfake-detection) / [العربية](https://cyberkov.com/ar/security-assessments/ai-image-deepfake-detection) - [Social Engineering Assessment](https://cyberkov.com/security-assessments/social-engineering) / [العربية](https://cyberkov.com/ar/security-assessments/social-engineering) - [Physical Security Assessment](https://cyberkov.com/security-assessments/physical-security) / [العربية](https://cyberkov.com/ar/security-assessments/physical-security) - [Compliance Gap Assessment](https://cyberkov.com/security-assessments/compliance-gap) / [العربية](https://cyberkov.com/ar/security-assessments/compliance-gap) --- ## Individual Services **English:** https://cyberkov.com/individuals **Arabic:** https://cyberkov.com/ar/individuals Security services for individuals, executives, and high-net-worth persons (English / Arabic): - [Mobile Spyware Detection (MSDS)](https://cyberkov.com/individuals/mobile-spyware-detection) / [العربية](https://cyberkov.com/ar/individuals/mobile-spyware-detection) — Pegasus, Predator, and stalkerware detection. - [Personal TSCM](https://cyberkov.com/individuals/tscm) / [العربية](https://cyberkov.com/ar/individuals/tscm) — Bug sweeps for home and personal offices. - [Personal Device Security](https://cyberkov.com/individuals/personal-device-security) / [العربية](https://cyberkov.com/ar/individuals/personal-device-security) — Device hardening and privacy protection. --- ## Industries Served - Government & Public Sector - Defense & Military - Financial Services & Banking - Oil & Gas / Energy - Critical Infrastructure - Healthcare - Telecommunications - Legal & Professional Services - Hospitality & Luxury - Education --- ## Company Pages | Page | English | Arabic | |------|---------|--------| | About | https://cyberkov.com/about | https://cyberkov.com/ar/about | | Cyberkov CERT | https://cyberkov.com/cyberkov-cert | https://cyberkov.com/ar/cyberkov-cert | | Leadership | https://cyberkov.com/leadership | https://cyberkov.com/ar/leadership | | CEO Message | https://cyberkov.com/ceo-message | https://cyberkov.com/ar/ceo-message | | Certifications | https://cyberkov.com/certifications | https://cyberkov.com/ar/certifications | | Press & Media | https://cyberkov.com/press | https://cyberkov.com/ar/press | | Industries | https://cyberkov.com/industries | https://cyberkov.com/ar/industries | | Contact | https://cyberkov.com/contact | https://cyberkov.com/ar/contact | | Recommendations & Awards | https://cyberkov.com/recommendations-awards | https://cyberkov.com/ar/recommendations-awards | --- ## Cyberkov CERT **English:** https://cyberkov.com/cyberkov-cert **Arabic:** https://cyberkov.com/ar/cyberkov-cert The first CERT in Kuwait, accredited by Carnegie Mellon University (CERT/CMU). Services include: - Vulnerability disclosure coordination - Incident response coordination - Threat intelligence and security advisories - Security notifications for Kuwait and the GCC region **Vulnerability Disclosure:** https://cyberkov.com/cyberkov-cert#disclosure --- ## Certifications & Accreditations - ISO/IEC 27001:2022 — Information Security Management - ISO/IEC 27701:2019 — Privacy Information Management - ISO 9001:2015 — Quality Management - CERT/CMU — Computer Emergency Response Team (Carnegie Mellon University) - Cyber Essentials — UK National Cyber Security Centre - IASME Cyber Baseline - MISP — Malware Information Sharing Platform (CIRCL) - CSTMIC --- ## Leadership **Abdullah Al-Ali** — Founder & CEO. Cybersecurity strategist and digital security advisor. Former Senior Cybersecurity Advisor to Kuwait's CITRA (2014–2020). Contributor to Kuwait's Cybersecurity Strategy 2017–2020. Regular commentator on Al Jazeera, BBC Arabic, CNN, CNBC, and Sky News Arabia. --- ## Machine-Readable Resources - [llms.txt](https://cyberkov.com/llms.txt) — Concise AI agent summary (llmstxt.org) - [SKILL.md](https://cyberkov.com/skill.md) — Agent playbook (agentskills.io) for Claude Code, Codex, Cursor, Copilot - [OpenAPI Spec](https://cyberkov.com/api/openapi.json) — OpenAPI 3.1 specification for all Cyberkov REST and tRPC endpoints. - [WebMCP Manifest](https://cyberkov.com/api/tools) — JSON manifest of all WebMCP tools registered via navigator.modelContext. - [API Catalog](https://cyberkov.com/.well-known/api-catalog) — JSON catalog of machine-readable endpoints (RFC 9727) - [Sitemap](https://cyberkov.com/sitemap.xml) — Full sitemap of all 362 pages (English + Arabic) — 183 searchable index entries. - [Security Policy](https://cyberkov.com/.well-known/security.txt) — Vulnerability disclosure and security contact - [Markdown Pages](https://cyberkov.com/) — All pages support `Accept: text/markdown` content negotiation for AI agents - [Arabic Markdown](https://cyberkov.com/ar/) — All Arabic pages return Arabic markdown for Arabic-speaking AI agents --- *Last updated: 2026-05-22*