While many people take steps to secure the distribution of their assets after they’re gone
it’s less common to think about asset protection right now .


About iSec

As a Cyber Security provider, we provide services and solutions to establish a consistent and secure environment within companies handling confidential data.

ISEC is one of few superior Security solutions companies offering services and products which apply the latest techniques, technologies, and security appliances via a highly qualified team to submit best practices of high levels of intelligent security solutions and its developed applications to companies and governments to protect them from hacking attacks and cyber-crimes.

IS iSec

We are one of the leading cybersecurity companies in MENA, providing cybersecurity services to the financial sector, government institutions, government utilities, fintech firms, oil and gas companies, and FMCG firms.

Founder & Chairman

Dr. Bahaa Eldin M. Hasan

Chairman & Founder

Dr. Bahaa Eldin M. Hasan is an expert specialized in the following areas: Data security, network security, computer security, Ethical hacking and countermeasures. Also, Dr. Bahaa built Smart cards, smart token and secure micro SD applications for securing the environment. Bahaa earned his Ph.D. in Computer& Systems Engineering department from Ain Shams University with Tokyo institute of Technology. . He has been giving courses on Data security, physical security and access control and Ethical hacking throughout the Arab world. Bahaa Hasan invented a New Symmetric Key Cryptosystem Which registered in Japanese Patent Office in Tokyo #140444/2 dated 30/5/1990 (This invention is a new cryptographic system based on Smart Card).


Is to advance the provision of cybersecurity services and solutions to create a secure and reliable environment for entities entrusted with confidential data. We specifically target financial service providers who face significant challenges in safeguarding customers' information, including credit/debit card details and other personal data, with a focus on ensuring that quality-based standards are maintained.


is to establish ourselves as the preeminent cybersecurity company in Egypt and the wider Middle East region. At ISEC, we place great emphasis on the following values as the building blocks of our success: confidentiality, innovation, integrity, quality, competency, efficiency, integrated solutions, and responsibility. These values are fundamental to our approach and underpin our commitment to delivering exceptional service and driving meaningful impact in the field of cybersecurity.


Also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. The tests involve using/implementing any of the known malicious penetration attacks on the application.

involves actively monitoring, shaping, and influencing the public perception of a brand organization to maintain a positive image and foster trust among stakeholders.

Is a centralized repository that holds information about the configuration items (Cls)within an organization's IT infrastructure.

The value of Red Teams can be understood most easily by imagining a fictional scenario. An organization might have an extremely well-developed pentesting process and therefore be confident that its systems can’t be breached by external actors

Refer to streams of information regarding potential and current cyber threats and vulnerabilities. These feeds are collected from a variety of sources to provide organizations with insights and data to help them understand and mitigate potential risks to their information systems and infrastructure.

Our daily life has become interlaced with fast-evolving technology from e-government to e-commerce and more. This growth has not spared the corporate world, but it frequently targets it specifically.

Governance, Risk, and Compliance (GRC) is concerned with identifying and controlling risks, adhering to new rules and regulations, maintaining the right to do business, protecting brand reputation, and, increasingly, establishing sustainability practices.

Social Engineering is a technique that relies on exploiting weaknesses in human nature, rather than hardware, software, or network vulnerabilities to collect necessary background information, such as potential points of entry and weak security protocols.

We are responsible for hiring the cyber security team which is more than 100 employees in the Central Bank of Egypt and financial cert.


We Care, We Cybersecurity Aware


The iHawk provides you with a Highly Secure way to upload and transfer documents using the Blockchain Technology in the form of a mail process which is very fast and reliable!

  • Trustful
  • Secure
  • Decentralized
  • User Friendly


Aware gives organizations access to a plethora of videos, interactive cyber security awareness content, and pre-designed modules to select from. These trainings are

  • Training Videos
  • Challenge
  • Game Time
  • Phishing Simulations

Wargames Lab

Interactive cybersecurity Platform that immerses participants in a simulated cyber-attack ,such as gaining or preventing access to a computer system or exploiting and defending a vulnerability in a system or an application.

  • Prepare participants to real-life security challenges and demands
  • Challenge participants to exploit and defend computer systems
  • Help participants to identify their strength and weakness inside a safe, forgiving and collaborative environment

iSec Hiring Hub


We are proud to present our team experiences

Experienced Information Security Engineers with a demonstrated history of working in the computer and network security industry. Skilled in Engineering, Information Security, Vulnerability Assessment, and Computer Security.

Our Engineers Holding The Below Certificates : 

CEH Practical



Join iSec Newsletter