CYBERSECURITY (Privilileged Access Management)

We can implement a solution, that stops an inadvertent or intentional attempted Data Breaches by Privileged Teleworkers, Outside Contractors, and Insiders.  Said solution can also be offered as a managed solution to others. A Business Plan documenting this is available.


Key components of Privileged Access Management (PAM) solution* include:

  • Users can be teleworkers, outside contractors  or insiders.
  • A Proprietary Invisible Cryptographic Identifier (Confidential)
  • A Proprietary and Strong Three-Factor Biometric Authentication (Confidential)
  • Continuous Authentication, Behavioral Analytics & Session Recoding anywhere (Confidential)
  • User and Computing session locations can change and be located anywhere (Confidential)
  • SSO and Federated Access Control for any user seeking access from anywhere to multiple platforms located anywhere (Confidential).
  • The solution is in compliance with NIST & CSIP while more reliable and lower in cost than other solutions
  • Existing notebook computer is used for both Classified Access and Personal Liberties (Confidential).
  • Components can also be used to protect against physical access.

Expert Witness Testimoney & Litigation Research

  • Telecom carrier collected toll fraud charges from Customers. Should PBX manufacturer, installation and maintenance company be held liable to customer for the fraudulent charges?
  • Individual is accused of making harassing calls to another.
  • Telephone system owner claims system it acquired did not do what it was represented to do.
  • Stockholders claim that management did not act in their best interest.
  • Claimant says he facsimiled certain information and insurance company claimed that they did not receive it.
  • One manufacturer claims that a license to use a cellular modem technology in an early product of a second manufacturer was also used in a later product without obtaining a license. 
  • Wife claims husband made harassing calls to her even though court said he shouldn't. 
  • Police Department claimed officer made certain telephone calls. 
  • Telephone Company claims that cable contractor did faulty work.
  • Subscriber claims Phone Company could have detected abusive callers earlier than it did. 
  • PBX/Manufacturer claims county government wrongly awarded contract for new system.
  • National Hospitality Industry group claimed new telephone rates will be harmful to them. 
  • State Hospitality Industry group claimed new telephone rates will be harmful to them. 
  • Small business owner claimed consistent "Ring-No-Answer" over a long period of time forced him out of business. 
  • Individual seeks compensatory and consequential damages for wrongful conviction.  

Our Senior SMEs are also experienced in most areas of Telecommunications to help clients. Wireless technologies include:

Visible Light Communications, LiFi, White-Fi Free Space Optics, WiFi, Millimeter Wave, CDMA, TDMA, WiMAX, P2P & P2MP Radio distribution systems using 2.4-4.9-5.8 GHz, Analog Trunked Radio systems, Digital trunked radio systems (IDEN & TETRA), Airport Ground Control radio systems, Digital Paging, Cellular Digital Packet Data (CDPD) for Point of Sale, Multichannel Multipoint Distribution Service (MMDS), C & KU band Satellite Earth Stations and transponders, International Protected Microwave links using 2 to 6 GHz, Tropospheric Scatter Microwave Radio links and Public Power Utility SCADA systems. 

For Wired telecommunications technologies we cover :

  1. Plastic, Buried and Aerial Optical Fiber;
  2. Broadband over Power Line (BPL) Communications,
  3. Power over Ethernet (POE) and
  4. Outside Plant Coaxial cable and fiber splicing technologies.  

For Telecom Infrastructure systems we cover:

  1. Communications tower design and implementation, 
  2. Nuclear Power Supplies for LMR radio in very cold weather, 
  3. Telecom Collocation Facilities, 
  4. Alternative power generation (diesel, gas, solar and wind) for surveillance camera,  transmission systems, and collocation facilities.   
  5. Fusion centers to support incoming calls for assistance and outgoing messaging to alert and dispatch Police, Fire, Medical, Police and/or the Military.

For Telecom Switching systems we cover:

  1. Web-enabled contact center utilizing Predictive Dialing, and Intelligent routing, 
  2. Virtual Call Center Technology, 
  3. Voice Network designs, 
  4. Very large and small Digital PBX systems, 
  5. Voice Response Systems, 
  6. VoIP switching Systems for Local and Wide-Area, 
  7. IP-PBX's with automatic fail-over to a second IP-PBX.
  8. Specialized Commodity and Stock Broker Trading Turrets,   

We are travelers and conduct our projects on a world-wide basis


Most of us are multi-million mile flyers and minimally have worked in:

Bahamas, Bonaire, Bulgaria, Canada, Curacao, Dominican Republic, Germany, Guadeloupe, Guyana, Haiti, Holland, Martinique, Nigeria, Poland, Suriname, Trinidad & Tobago, Turks & Caicos, Virgin Islands (US & UK), Venezuela and incidental business meetings in all other Caribbean countries.  

Contact Us with Questions or Ask for our Help.

We will respond quickly. There are no 9 to 5'ers here.

 Contact us at any time. You might be surprised to find us at all hours of the day, night and on the weekend, ready to help you. 

The Technology Consultancy

Marietta, Georgia

(770) 628-0211