OUR SERVICES

What We Do

Cyber Security Management

Trinity Global Services is a strategic partner to a host of multi-billion dollar and multinational creme da la crème clientele, partnering with them for Advertising, Public Relations, Image Building, Film Production, Digital Marketing, Advanced Cyber Security management, Finance, Corporate, Strategic advisory and project management.

Few of our clients:

45 Billion USD conglomerate Aditya Birla Group, 30 Billion USD Larsen and Toubro, 450 Billion USD Johnson & Johnson to name some.

What we have in Cyber Security Management:

We have a team of cyber security specialists who are pioneers in cybercrime investigation, digital forensics and specialized information security solutions serving customers in Law Enforcement, Enterprises, Government and the growing SME segment.

The team has deep domain experience and knowledge of various digital forensic tools and in analyzing and concluding forensic investigations across various industry segments globally.

Our team provides consultancy services such as Custom Digital Forensic Training, Computer Forensics Investigations and Lost Data Recovery.

True Cyber Security is preparing for what's next, not what was last.

What we offer in Advanced Cyber Security Management:

We use world-class computer forensic software tools.

Our offerings in the cyber security domain:

  • Disk Forensics
  • Mobile Forensics
  • Network Forensics
  • Mac Forensics
  • Forensic Accounting
  • Big Data Forensics
  • Digital Forensics Audit
  • Malware Analysis
  • Cloud Forensics
  • Data Leakage Analysis
  • Video Forensics and Audio Forensics
  • Vulnerability Analysis

We have preventive and proactive IT and Cyber audits. A regular Cyber Audit will allow an entity to stay abreast with the changing times and developing technologies.

Our products can empower analysts and knowledge workers in different scenarios:

  • National Security
  • Counter-terrorism
  • Law Enforcement
  • Cyber-defense
  • Cyber-offense
  • Fake News Detection
  • Dark web monitoring
  • Target Profiling and Surveillance
  • Powerful Collection from Closed Groups and Forums
  • AI-based Automatic Social Engineering
  • Complete coverage of all popular social media platforms
  • Automatic Report Generation
  • Deep Analytics with drill-down capability
  • Highly secure solution
  • Real Time Facial Recognition

Our solutions for social media monitoring are:

  • Complete coverage of all popular social media platforms
  • Powerful Collection from Closed Groups and Forums
  • Automatic Responses and Takedown
  • AI-based Detection of Fake News
  • Deep Analytics with drill-down capability
  • Automatic Report Generation
  • Highly secure solution
  • Trace Origins of Fake News

Our face recognition technology can automatically identify and track individuals, both indoors and outdoors.

  • Detect up to 20-years old image
  • Detect Partially hidden faces
  • Accuracy and Reliability: Firstin1:1 and 1:N
  • Head angles of ±90° horizontal, ±30° vertical
  • Detect a face with a minimum size of 45X45 pixels etc

Our Video Analytics Features are:

  • To detect short and long duration illegal parking.
  • To detect potholes and pipe-bursts.
  • To detect fire incidents.
  • Locate the position of the event,
  • Camera number/name,
  • Date and time of the event, and
  • Generate a maximum of three levels of alarm, incase the first two
    alarms are not attended to.
  • EFIT6 Facial Composite Software.
  • Automatically creates sketch of faces.

Voice Verification & Speech Recognition Software Our AI-powered solutions lets you build voice bots, verify a speaker’s identity based on voice biometrics, transcribe speech to text, and search for speakers and context in Large amounts of audio.

DEBUGGING & TECHNICAL SURVEILLANCE COUNTER MEASURES

  • Elicit audio or optical bugging devices
  • GSM, 2G, 3G, 4G and LTE cellular eavesdropping devices wireless bugs
  • Wire and mic taps and telephone taps Carrier current bugs
  • Micro wireless video devices
  • Laser or infrared eavesdropping devices Ultra sonic eavesdropping devices
  • VoIP phone intrusions Illicit IMSI catcher attacks
  • Audio/visual equipment vulnerabilities Wi-Fi intrusions
  • Bluetooth vulnerabilities
  • Mobile device and computer spyware/malware
  • GPS tracking and eavesdropping devices in/on vehicles

TELECOMMUNICATIONS PROJECTS WHICH CAN BE DONE AND EXECUTED

  • Secure Communication without involving the service provider
  • Setting up communication services in areas where normal cellular provider is Unavailable
  • Secure communication for VVIPs and Military grade operations

Our Cyber security Training modules:

We also have a number of computer forensics courses designed as per the customer’s requirements in the disciplines of forensics investigations, memory forensics, network forensics and mobile device forensics. The training Methodology in each of the course is:

  • Conducting examinations• Identifying where and how data is stored
  • Recovering and interpreting data and drawing appropriate conclusions

Our Corporate Training Courses:

The syllabus is designed for a corporate organization aspiring to have its own Digital Forensics unit. We use practical case scenarios which will guide them through the process of conducting a computer forensics investigation.

Our Professional Courses & Certification:

The training focus is not only on forensic recovery techniques mentioned above, but also strongly focused on ensuring what the examiner finds are admissible in a court of law. A sound examination process along with expertise in evidence-handling procedures are also taught.

To sum up our cyber security services are:

  • Digital Fraud Investigation and Analysis
  • Cyber Security, computer, mobile and disk forensics
  • Digital Forensics and Data protection
  • Data Privacy, Training and Data Compliance Management
  • Fraud Prevention Services
  • Digital Forensic Readiness for various government departments and critical sectors
  • Customized solutions to prevent data leakages from within
    the organization.
  • Creating international cyber laws and policy frameworks for various governments.

OUR LEADERSHIP

Job Cornelius – Founder CEO

Bitten by the entrepreneurial bug, Job Cornelius founded Trinity Global Services in 2007 with a sharp focus on fund-raising for corporates. In March 2014, buoyed by his success in his venture, Job diversified into integrated digital communications with a plethora of services in media and public relations, digital investor relations, financial advertising, business and media analysis.

A post graduate in Diploma in Management Studies and a Masters in Financial Management from K. J. Somaiya Institute of Management Studies and Research – a reputed B-School in Mumbai, India, Job has over three decades of experience in his areas of expertise. He started his career in 1994 as a sales executive, marketing financial products of Standard Chartered Bank. He specializes in Fund-Raising, Strategic Project Management and Building Synergies. He has a proven record of delivering results with ROI for his clients in the field of finance, digital communications and project management.

His extensive global reach and network and marketing skills combined with his experience and knowledge in his domains of expertise, has ensured Trinity Global Services a strong head-start right from its inception itself. Job is also Managing Partner in Mumbai-based Jeremy Infrastructure LLP, Founder-Managing Trustee in Children of God Foundation, Mumbai, Film Producer in Logos Entertainment and Productions, a visiting faculty in the highly reputed St. Andrews College, lecturing on the subjects of banking, finance and insurance.

Hamed Mohammed Alyafei

Sir Hamed is a highly reputed Qatari National, educated from the United Kingdom and the United States. He is a technically qualified project manager with 42 years of experience in Education, Leadership, Management, Technical, Administration and Entrepreneurship. Sir Hamed is well read and is highly efficient in managing international businesses. He has participated in many reputed development committees. He is a innovative thinker and specializes in crises management.

James Nicholas

James has three decades of industry experience and manages high profile relationship management services spanning Qatar and the rest of the Gulf, South America, Europe and Africa. He is multi-lingual and has travelled extensively across the globe. He speaks Spanish, French, German, several African languages and English. He also specializes in real estate and project management. He is an ex-professional footballer and has played in Europe. He has an excellent acumen in sports management.

Jim Rasmusson

Jim is from Sparta, WI, USA. Jim is a connector and a team builder who excels at providing people with resources and connections for their health, growth and success. He has been serving people for over 30 years as a Doctor of Chiropractic, small group leader, volunteer, and as a children’s educator, mentor and advocate. Jim manages High profile relationships in the United States.

Want To Start A Project With Us?

LET'S BE IN TOUCH