Skip to Main Content

Cybersecurity Solutions

Hey Alexa, give cybercriminals full access to my personal information

Those who know me will tell you that I have a love/hate relationship with IoT of any kind. The love part is easy: devices that, added to our daily routines and lifestyles, bring an almost futuristic experience to our collective lives. Then...
Learn More About "Hey Alexa, give cybercriminals full access to my personal information"

Cybersecurity Solutions

Why Everyone’s Accounts Are So Easy To Hack

When it comes to cybersecurity, the number of breaches happening daily are almost impossible to count. In fact, just this past week the public was made aware of several major breaches, including the Government of Canada and Amazon’s Alexa—two terrifying examples of...
Learn More About "Why Everyone’s Accounts Are So Easy To Hack"

Cybersecurity Solutions

Are your IoT devices about to attack you?

I know it's a weird question to ask, after all how dangerous can a wi-fi enabled thermometer be? Don't own a thermometer? Okay, how about a toy car with a mobile app that acts as a remote? Not into toy cars? What...
Learn More About "Are your IoT devices about to attack you?"

Cybersecurity Solutions

How the smallest of devices pose the largest security threats

I've often said that we live in an absolutely amazing time in history. The sheer amount of technological advancements seems to know no bounds, growing exponentially as every day passes. From apps to devices, the list is virtually endless when it comes...
Learn More About "How the smallest of devices pose the largest security threats"

Cyber Strategy Solutions

Our team of industry-renowned experts paired with our technology partners enables leading-edge security strategies that meet any security need. Whether it be data protection, encryption, emissions security, endpoint security, identity access management (IAM) and privileged access management (PAM), or cloud security (CASB)—our team has both the expertise and technology to keep your business safe.

Learn More

Consulting Services

Organizations must continually maintain a highly resilient approach to ensure that their data, their people and their business remain safe from cyber attacks. Our comprehensive suite of cybersecurity consulting services is designed to help organizations through the full range of in-depth security assessments, along with cyber security awareness training, through to product implementation and integration.

Learn More

Managed Services

Cybersecurity is a never-ending endeavor, one that must be continually monitored and managed, and continually evolving. It's for this reason that we have created our suite of managed services designed to address the most critical and time intensive aspects of cyber security. Our managed services include virtual chief information security officer (CISO), managed security operations center, managed firewall, cyber awareness management, and security infrastructure monitoring and management.

Learn More

RF Emission Security

Electrical and electronic devices radiate energy in the form of radio frequencies (RF emissions), which can be intercepted and analyzed. RF emissions present a potential vulnerability to organizations processing sensitive or classified information. EMSEC, or emission security, prevents the exposure of this data by assessing unintentional emissions to determine whether they carry classified or sensitive information. These emissions are called “compromising emanations”. Our RF emission security solutions help government departments and private sector businesses protect their sensitive data by mitigating these information breaches before they can be exploited.

Learn About Calian RF Emission Security Services
McAfee
Forcepoint
Thales
Fortinet
Netskope

Our success is rooted in our people.

Meet our experts

Kevin de Snayer

Cybersecurity Solutions

Kevin joined Calian in 2017 through the acquisition of Secure Technologies Inc. He has over 15 years of experience in the cyber industry been in the cyber industry assisting numerous Canadian Federal Government Departments and Private Sector clients create, edit and build their IT security policy, including the implementation of hardware to enforce the policy. His proficiency of IT/IS Security is based on his technical knowledge of local, wide area, VPN, and Internet network architecture and administration, with years of experience designing, implementing and maintaining enterprise level data networks. He specializes in McAfee (formerly Secure Computing) network security hardware. His experience includes various networking Operating Systems including Unix, MAC OSX, Linux and Windows, firewalls, network security, WLAN and virtual private networking (VPN). He is also a Certified MFE Firewall Instructor.

See expert’s full profile

Connect with our Experts

We'll find effective solutions to meet your specific needs.

Contact Us