Proactively defend against evolving cyber outages by discovering the threats before the outage occurs. Be able to visualize the threats end to end by combining information from many security technologies into one composite picture for early threat analysis and decision making. Be able to visualize the indicators of attack happening in-memory and stop the attack before it occurs. Be able to quickly share the indicators of attacks with your community in a secured manner to prevent others from falling prey.
Request a DemoMalicious software has been downloaded in advance by the perpetrators without your knowledge.
Our security analysts are swamped with voluminous alerts from so many different data sources.
They lacked visibility and has difficulty responding in a timely manner.Engineered by our elite team of expert cybersecurity researchers and practitioners, Custodio developed CyVestiGo Virtual Threat Hunting, CyBlu and CyShare.
CyRaptor – a NextGen cybersecurity tool, automatically detect potential threats, pivots them correlates and provide context for every event. Map those events and generate an intuitive multi-layer threat visualization graph
Threat Hunting
detecting anomalies & threats in real-time, 24/7
Threat Visualizer
creates a multi-layer threat visualization graph
Intelligence-based cyber investigation
enriched with TTPs, IOCs, and risk scores.
Seamless integration
easy deployment within your organization
Seamless automation
generates automated log analytics & reports
Precise decision making
robust and effective decision making
A trusted, secured information sharing and collaboration platform.
Adieus to cumbersome email chain. It enables National Level, Sectoral Level, Industry-wide, Large Organizations or Managed Security Service Providers to manage, share and collaborate information via a secured and trusted platform.
Collaboration
Discussions for the same topic are kept in one thread to enable better collaboration.
Classify information
Classify information via Traffic Light Protocol (TLP)
Situationally Aware
Central authority remains situationally aware of the spread of cyber-attacks, by monitoring the dashboard for members’ responses.
General Manager
Martin Lui is the first local General Manager with Custodio Technologies since joining the organisation in January 2023. Prior to this, Martin has served 37 years in the public sector holding key appointments with the Ministry of Defence, Ministry of Home Affairs and Cyber Security Agency in areas of Cybersecurity, Critical Information Infrastructure Protection and Digital Transformation. He hopes to continue his service, in the private sector, by providing meaningful solutions and services to enhance our Cybersecurity posture in Singapore and abroad.
Finance Director
Alex is a Chartered Accountant with over 20 years of experience across multiple industries covering APAC. He has been involved in developing and leading multiple financial management functions including business partnering, controllership as well financial planning and analysis, with demonstrated experience in financial transformation and scaling the business for growth.
Director, Growth & Ops
Alvin has over 20 years of knowledge in various cybersecurity domains and experience in various security programmes. He previously managed various big scale defense projects and has experience designing complex cyber systems like CTI platform, SOC and zero-trust network. He has led the Custodio team to achieve ‘breakthrough’ in local cybersecurity R&D through 2 innovative products; CyRaptor (Solution for threat hunting & root cause analysis), CyBlu (Data center class solution that does out-of-band memory analysis with Nvidia DPU) and looks forward to collaborating with strategic partners to grow the company business and foster innovation.
Principal Cyber Security Researcher
Hazwan is a seasoned professional with extensive experience in law enforcement, Security Operations Center (SOC) and Network Operations Center (NOC) environments. Adept at identifying and mitigating security threats and risks, conducting cyber forensics examination, and maintaining network infrastructure. He uses the knowledge and skill that he has acquired to identify and understand unique security use cases and develop solutions for them.