What We Do
Close What We Do
Open What We Do
Advise
Services
Products & Platforms
Domains
Cyber Strategy, Governance & Risk
Strategy & Target Operating Model
Enterprise Risk Management
GRC Framework, Tooling & Automation
vCISO & Trusted Advisory
Business Continuity & Resilience
Third Party & Supply Chain Risk
Regulatory & Compliance Management
Posture & Maturity Assessments
Regulatory Assurance Program
ISO & International Standards Enablement
Security Testing & Evaluation
Red Teaming
Vulnerability Assessment & Penetration Testing
Purple Teaming
Source Code Reviews/DevSecOps
Cyber Academy
Learning Needs Analysis
Cyber Awareness & Training
Cyber Crisis Simulation
Phishing Campaigns
UAE Comply.360
Cyber Escape Room
Cyber Cloud
Cloud Security Posture Assessment
Cloud Service Provider Selection Advisory
Cloud Security Testing
Cloud Compliance Assessment
Data Privacy
Data Privacy Maturity & Risk Assessment
Privacy Program & Governance Design
Regulatory & Cross-Border Compliance Advisory
Privacy Awareness & Training
AI
AI Governance Program Design & Implementation
AI Use Case & Risk Tiering (System Impact Assessments)
Responsible AI Advisory & Training
AI Security Assessment
OT
OT Risk and Compliance Review and Assessment
OT Architecture Assessment
OT Gap & Maturity Assessment
Physical
Security Design
Security Consultation & Compliance
Security Audit
Security Upgrades & Integration
Security Training
Protect
Services
Domains
Enterprise Security Architecture & Transformation
Identity & Access Management
End User Security
Data Security
Application Security
Network & Insfrastructure Security
Cyber Cloud – Protect
Cloud Security Architecture and Design
Cloud Cyber Transformation
Cloud Security Tools Implementation
Data Privacy – Protect
Privacy Controls & Engineering
Data Security Posture Management
AI – Protect
Secure AI Architecture & Engineering
AI Firewalls
Secure Data for AI
OT – Protect
OT Security Architecture Design
OT Security Solution Deployment, Integration & Testing
OT Network Segmentation & Defensible Architecture
Physical – Protect
Security for all Market Verticals
Cyber Physical Security Convergence
Command Control Room
Operate
Services
Products & Platforms
Domains
Cyber Resilience Services
Managed eXtended Detection & Response (MXDR)
Digital Forensics, Incident Response (DFIR) & Threat Hunting
Predictive Threat Intelligence
CTEM Cyber Threat Exposure Management
Cyber and Disaster Recovery
Cyber Operations Services
Identity & Access Management
End User Security
Data Security
Application Security
Network & Infrastructure Security
Vulnerability Remediation-as-a-Service
NOC/ITSM
Resonance
MOVIS-DVR
VANTAGE-LPR
Nawa-NGC2
DFIR & CTEM Bundle
Cyber Cloud – Operate
Cloud Security Monitoring
Cloud Security Managed Services
Cloud Compliance Maintenance
Privacy – Operate
Data Privacy Compliance Monitoring & Reporting
Data Privacy Operations as a Service
AI – Protect
AI Security Posture Monitoring & Management
AI Compliance Monitoring
Physical – Operate
System Installation, Commissioning & Maintenance
Security Control Rooms for Multi Site Monitoring
Technical Surveillance Countermeasures (TSCM)
Physical Screening & EOD Containment
Rapid Deployment Security
Video Analytics & Advanced AI
Security Product Development R&D
Insights
Close Insights
Open Insights
Reports
& Whitepapers
×
Latest Reports & Whitepapers
Digital Forensics & Incident Response (DFIR)
MORE
Securing the GCC’s Digital Future
MORE
Detecting web shells with network monitoring tools
MORE
All Reports & Whitepapers
Blogs
×
Latest Blogs
Bridging the gap: Integrating secure code review into the DevSecOps
MORE
Security Performance Measurement: From compliance to confidence – Part 2
MORE
Security Performance Measurement: From compliance to confidence – Part 1
MORE
All Blogs
Media
×
Latest Media
Test News
MORE
All Media
Events
×
Latest Events
Test Event
MORE
CPX Cyber Bytes
MORE
All Events
Threat
Advisories
×
Latest Threat Advisories
Weekly Digest | 28th April – 2nd May
MORE
Weekly Digest | 21st April – 25th April
MORE
Weekly Digest | 14th April – 18th April
MORE
All Threat Advisories
Who We Are
Close Who We Are
Open Who We Are
About Us
×
Anticipating
future security challenges,
we deliver innovation
and resilience through talent,
technology, and trust.
Learn more about CPX's story
Leadership
×
Hadi ANWAR
CEO of CPX
Securing the future demands
leadership shaped by
experience, foresight,
and unwavering
commitment.
Get to Know Our Leadership
Certifications
×
We adhere to the
highest industry
certification standards
to ensure trust, resilience,
and compliance.
See our certifications
Partners
×
we focus on
building strong alliances
with key local
and international players
to shape a secure future.
Meet our proud partners
Careers
×
Interested in joining
one of the fastest-growing
companies in the UAE?
Check The Opportunities
Contact Us
Search
Search