SlideShare a Scribd company logo
1 of 8
Download to read offline
Security Audits & Cyber Services
Ultrax Consulting
Ultrax Consulting Limited offers sophisticated
security solutions to clients globally, whether
in the form of proactive intelligence gathering,
preventative security measures, consultancy
advice or training. The company’s‘hunter turned
gamekeeper’approach is a clear advantage
in executing a mission statement to deliver
a genuinely high quality service, based on
proven knowledge and experience of the most
sophisticated techniques and technologies.
The company’s services include, but are not
limited to:
» Technical Surveillance Counter
Measures (TSCM)
» Covert Surveillance
» Surveillance Detection
» Cyber Security
» Security Audits
» Bespoke Training
Security Audits &
Cyber Services
We offer a range of services aimed at
assessing physical security and procedural
vulnerabilities, including the resilience of
the data and communications systems that
support them. We recognise the benefits
of identifying a weakness before it can be
exploited so that a robust programme of
preventative measures can be implemented
to mitigate the risk of information leakage
and reputational damage.
Our vetted experts honed their skills and
techniques within Government departments
responsible for National Security, and use
proven, unconventional techniques to
conduct comprehensive and methodical
penetration testing aimed at establishing and
remedying vulnerabilities. Their findings and
recommendations are presented in clear and
detailed reports with prioritised action points.
Audits
All audits commence with a full threat
assessment, taking information from the client
and other sources to establish the level of
sophistication and access most likely to be
available to a would-be attacker. This approach,
coupled with an up to date knowledge of
access-control equipment and technologies,
allows us to identify the areas most vulnerable.
As well as helping mitigate risk, we can also
assist in putting in place a robust security
incident management process, designed to
swing into action should a security breach
occur.
Pen-Testing
Intended as a realistic test of security measures
and procedures, physical penetration testing
(commonly referred to as‘Pen-Testing’) is
recommended following a security audit, and
involves targeting areas of weakness in the
existing security arrangements in order to
attempt to gain physical access to a premises or
a specific area. To help maintain realism, the test
is usually conducted without the knowledge of
security staff. We are able to draw upon a pool
of people, who are knowledgeable in the use
of unconventional methods of attack, and we
match their profiles and skills to a particular task.
Cyber
The technical security of IT systems and
networks, communications, mobile devices
and data is vital in order to prevent loss or
compromise of sensitive information and
to ensure that business is able to continue
uninterrupted. Cyber penetration testing,
or‘Ethical Hacking’, involves the use of a
comprehensive range of techniques intended
to identify weaknesses before they can
be exploited. By drawing on open source
information and social media to harvest
details of personnel, often assisted by social
engineering or‘phishing’, we are able to conduct
a thorough series of tests aimed at attempting
to extract data or disrupt operations. Cyber
security penetration testing is often conducted
in parallel with physical penetration testing to
attempt to gain access to a network from the
inside, thereby bypassing firewalls and other
typical cyber security defences. In addition to
physical computer networks, the resilience of
‘Cloud’services is also tested.
NIDS
Whilst Cyber Penetration Testing focuses on
identifying vulnerabilities and attempting to
exploit them from outside the network, our
Network Intrusion Detection System (NIDS)
employs network sensors tailored to a client’s
business, infrastructure, threat profile and
budget. The sensors are attached directly to
the network to provide full visibility of network
traffic, and use software to filter it and compare
each packet of data to a set of rules, looking
for signs of malicious behaviour. This approach
provides a view of all inbound and outbound
network traffic, including email and web
browsing, as well as visibility of all Internet
scanning and automated attacks.
Monitoring the network provides only part
of the picture, as all alerts picked up by the
network monitoring will have their origin
somewhere on a host. Using a‘host agent’,
we are able to provide excellent visibility of
all activity on a client’s network endpoints,
allowing detection of the machine and user that
generated the traffic which was flagged up as
being suspicious.
Forensics
In addition to providing Cyber Security services,
we also conduct thorough post-event forensic
examinations of computers, mobile devices
and digital media in order to positively prove
and establish the extent of suspected fraud
and wrongdoing. The complexity of such items
makes it incredibly difficult for the user to
completely erase all evidence of their activities,
no matter how hard they might try to cover
their trail. We use the latest equipment to
covertly produce a bit-by-bit forensic duplicate
of the original item, which is then taken to our
specialist facility for thorough examination. This
approach allows clients to discreetly determine
whether their suspicions are well founded.
As well as examining forensic images of
computer hard drives, we are also able to
recover historical activity from a wide range of
electronic devices, including memory cards and
sticks. Typically, we might be asked to retrieve
emails, browser and Internet activity, call
history, SMSs, documents, intellectual property,
photographs and passwords from computers
and smart-phones. It is also often possible to
retrieve accidentally and deliberately deleted
information and history.
Protection
Smartphones, laptop computers and tablets
are now commonplace in society, but few users
are aware of the security implications, including
the risks associated with Wi-Fi hotspots, or the
fact that criminals often use such networks to
covertly harvest information. We help clients
overcome this by providing solutions such as
secure email and voice communications, secure
memory and data storage devices, Whole Disk
Encryption (to protect the contents of a mobile
device’s hard disk) and Virtual Private Network
(VPN) tunnelling software to protect your data
whilst it is travelling over untrusted networks.
Training
By maintaining an up to date knowledge of
the strengths and vulnerabilities of the latest
physical and technical security measures, we
are able to build bespoke training courses and
tailored security briefings designed to inform
and reinforce best practice, especially for those
travelling overseas. Advice might be aimed at
countering specific technical security issues or
highlighting the techniques likely to be used by
hostile parties to intercept communications and
steal data.
Consultancy
We provide a consultancy service aimed at
quickly identifying the areas where resources
are best directed. It is often the case that the
greatest immediate benefit can be gained by
making simple procedural changes, rather
than investing heavily in physical and technical
defences.
Legal
We will only undertake activities that are lawful
within the jurisdiction in which we are tasked to
work. Requests to operate outside established
legal parameters will be politely declined.
Intelligence | Security | Training
Ultrax Consulting Limited
29 Farm Street, London W1J 5RL
United Kingdom
+44 (0)20 7193 7460 | info@ultraxconsulting.com
www.ultraxconsulting.com

More Related Content

What's hot

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughSavvius, Inc
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesomriyad
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRIZivaro Inc
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...ijtsrd
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On TrainingTonex
 

What's hot (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
SNIA2015 - Solo, Indonesia - Sarwono sutikno + yoko acc Cybersecurity Risk a...
SNIA2015 - Solo, Indonesia - Sarwono sutikno + yoko acc  Cybersecurity Risk a...SNIA2015 - Solo, Indonesia - Sarwono sutikno + yoko acc  Cybersecurity Risk a...
SNIA2015 - Solo, Indonesia - Sarwono sutikno + yoko acc Cybersecurity Risk a...
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
 

Similar to Security Audits & Cyber

CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inOllieShoresna
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfforladies
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security ChecklistMobeen Khan
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdfpublicchats
 
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information LeaksHow To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information LeaksTammy Clark
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security RisksDavid Kondrup
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Cyber security
Cyber securityCyber security
Cyber securityPrem Raval
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Understanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdfUnderstanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdf247 tech
 

Similar to Security Audits & Cyber (20)

CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Inicio security
Inicio securityInicio security
Inicio security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
Cyber Security | Information Security
Cyber Security  | Information SecurityCyber Security  | Information Security
Cyber Security | Information Security
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information LeaksHow To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Understanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdfUnderstanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdf
 

Security Audits & Cyber

  • 1. Security Audits & Cyber Services
  • 2. Ultrax Consulting Ultrax Consulting Limited offers sophisticated security solutions to clients globally, whether in the form of proactive intelligence gathering, preventative security measures, consultancy advice or training. The company’s‘hunter turned gamekeeper’approach is a clear advantage in executing a mission statement to deliver a genuinely high quality service, based on proven knowledge and experience of the most sophisticated techniques and technologies. The company’s services include, but are not limited to: » Technical Surveillance Counter Measures (TSCM) » Covert Surveillance » Surveillance Detection » Cyber Security » Security Audits » Bespoke Training
  • 3. Security Audits & Cyber Services We offer a range of services aimed at assessing physical security and procedural vulnerabilities, including the resilience of the data and communications systems that support them. We recognise the benefits of identifying a weakness before it can be exploited so that a robust programme of preventative measures can be implemented to mitigate the risk of information leakage and reputational damage. Our vetted experts honed their skills and techniques within Government departments responsible for National Security, and use proven, unconventional techniques to conduct comprehensive and methodical penetration testing aimed at establishing and remedying vulnerabilities. Their findings and recommendations are presented in clear and detailed reports with prioritised action points. Audits All audits commence with a full threat assessment, taking information from the client and other sources to establish the level of sophistication and access most likely to be available to a would-be attacker. This approach, coupled with an up to date knowledge of access-control equipment and technologies, allows us to identify the areas most vulnerable. As well as helping mitigate risk, we can also assist in putting in place a robust security incident management process, designed to swing into action should a security breach occur. Pen-Testing Intended as a realistic test of security measures and procedures, physical penetration testing (commonly referred to as‘Pen-Testing’) is recommended following a security audit, and involves targeting areas of weakness in the existing security arrangements in order to attempt to gain physical access to a premises or a specific area. To help maintain realism, the test is usually conducted without the knowledge of security staff. We are able to draw upon a pool of people, who are knowledgeable in the use of unconventional methods of attack, and we match their profiles and skills to a particular task.
  • 4.
  • 5. Cyber The technical security of IT systems and networks, communications, mobile devices and data is vital in order to prevent loss or compromise of sensitive information and to ensure that business is able to continue uninterrupted. Cyber penetration testing, or‘Ethical Hacking’, involves the use of a comprehensive range of techniques intended to identify weaknesses before they can be exploited. By drawing on open source information and social media to harvest details of personnel, often assisted by social engineering or‘phishing’, we are able to conduct a thorough series of tests aimed at attempting to extract data or disrupt operations. Cyber security penetration testing is often conducted in parallel with physical penetration testing to attempt to gain access to a network from the inside, thereby bypassing firewalls and other typical cyber security defences. In addition to physical computer networks, the resilience of ‘Cloud’services is also tested. NIDS Whilst Cyber Penetration Testing focuses on identifying vulnerabilities and attempting to exploit them from outside the network, our Network Intrusion Detection System (NIDS) employs network sensors tailored to a client’s business, infrastructure, threat profile and budget. The sensors are attached directly to the network to provide full visibility of network traffic, and use software to filter it and compare each packet of data to a set of rules, looking for signs of malicious behaviour. This approach provides a view of all inbound and outbound network traffic, including email and web browsing, as well as visibility of all Internet scanning and automated attacks. Monitoring the network provides only part of the picture, as all alerts picked up by the network monitoring will have their origin somewhere on a host. Using a‘host agent’, we are able to provide excellent visibility of all activity on a client’s network endpoints, allowing detection of the machine and user that generated the traffic which was flagged up as being suspicious. Forensics In addition to providing Cyber Security services, we also conduct thorough post-event forensic examinations of computers, mobile devices and digital media in order to positively prove and establish the extent of suspected fraud and wrongdoing. The complexity of such items makes it incredibly difficult for the user to completely erase all evidence of their activities, no matter how hard they might try to cover their trail. We use the latest equipment to covertly produce a bit-by-bit forensic duplicate of the original item, which is then taken to our specialist facility for thorough examination. This approach allows clients to discreetly determine whether their suspicions are well founded. As well as examining forensic images of computer hard drives, we are also able to recover historical activity from a wide range of electronic devices, including memory cards and sticks. Typically, we might be asked to retrieve emails, browser and Internet activity, call history, SMSs, documents, intellectual property, photographs and passwords from computers and smart-phones. It is also often possible to retrieve accidentally and deliberately deleted information and history.
  • 6. Protection Smartphones, laptop computers and tablets are now commonplace in society, but few users are aware of the security implications, including the risks associated with Wi-Fi hotspots, or the fact that criminals often use such networks to covertly harvest information. We help clients overcome this by providing solutions such as secure email and voice communications, secure memory and data storage devices, Whole Disk Encryption (to protect the contents of a mobile device’s hard disk) and Virtual Private Network (VPN) tunnelling software to protect your data whilst it is travelling over untrusted networks. Training By maintaining an up to date knowledge of the strengths and vulnerabilities of the latest physical and technical security measures, we are able to build bespoke training courses and tailored security briefings designed to inform and reinforce best practice, especially for those travelling overseas. Advice might be aimed at countering specific technical security issues or highlighting the techniques likely to be used by hostile parties to intercept communications and steal data.
  • 7. Consultancy We provide a consultancy service aimed at quickly identifying the areas where resources are best directed. It is often the case that the greatest immediate benefit can be gained by making simple procedural changes, rather than investing heavily in physical and technical defences. Legal We will only undertake activities that are lawful within the jurisdiction in which we are tasked to work. Requests to operate outside established legal parameters will be politely declined.
  • 8. Intelligence | Security | Training Ultrax Consulting Limited 29 Farm Street, London W1J 5RL United Kingdom +44 (0)20 7193 7460 | info@ultraxconsulting.com www.ultraxconsulting.com