Welcome to

Corpusnet Technology Center


of Federal Republic of Nigeria

EYEONIX AFRICA is the business partner of CORPUSNET and EYEONIX SΑ in Nigeria

EYEONIX AFRICA is dealing with national security & intelligence technologies and advanced communications systems.

Aminu Akilu

Managing Partner

Mr. Akilu is a co-founder and the managing partner of the firm. He is the focal point of all company's activites in the region.

George Strouzakis

Senior Vice President

Mr. Strouzakis is a co-founder and the Senior Vice President of the firm. He is responsible for all business and development activities for systems and solutions.

Kiros Iosifidis

Chief Technology Officer

Mr Iosifidis is the Chief Technology Officer of the firm. He is in charge of any technological and technical aspect for all company's projects.

Communications , active intelligence and decision support platform

UNIFIED COMMUNICATIONS PLATFORM , COMMAND powered by SAMSUNG SDS

UNIFIED COMMUNICATIONS PLATFORM , COMMAND powered by SAMSUNG SDS

COMMAND powered by SAMSUNG SDS is a unified Command and Control platform utilizing Push-To-Talk-over-IP technology. COMMAND is assisting decision makers within Government Special Agencies to coordinate efficiently and effectively by communicating instantly at the highest grade of security, as well as to collaborate across ranks of hierarchy, according to the enhanced organizational, strategic and tactical needs.

Learn More
E2E FULL DUPLEX VOICE CALLS

E2E FULL DUPLEX VOICE CALLS

The ultimate solution for end-to-end encryption of voice calls and text messages. Available on iOS and Android, it connects calls quickly, keeps them secure and ensures excellent voice quality. It works globally, across network barriers, and across all carriers. Deployed securely on premises (or a data center trusted by the client), it can be managed centrally and end-users can be enabled over the air.

Learn More
SECURE MAIL SERVER

SECURE MAIL SERVER

Secure professional email solution with own domain Mail, Calendar, Files, Chat, Videocalls, SMTP/ESMTP support, IMAPv4 - PUSH via IDLE support, IMAP ACL, public folders implemented SASL authentication framework, Active Directory/LDAP support, Automatic Message Archiving, Smart Attachment handling, IMAP/POP3 Migration Tool.

Learn More
INTERSUITE

INTERSUITE

Brings advantages of modern Unified Communications into Command & Control room environments, taking all the security and availability requirements into account. Combines different communication infrastructures with easy to use GUIs (Graphic User Interfaces) based on modern WEB software technologies. COMMAND user interface allows the adoption of customer specific workflows. Intersuite closes the communications gap between non-compliant systems and sub-systems and therefore puts users of existing legacy systems to interact with the modern Command Ecosystem.

Learn More
STAND ALONE MOBILE SOLUTION

STAND ALONE MOBILE SOLUTION

The Standalone Mobile Solution consists of a private 4G/LTE/WIMAX/ network and the appropriate end-points (computers, tablets, smartphones) that create a communication network with a radius of about 10-15 Kilometers from the mobile deployment asset (fixed or mobile). The Solution includes the COMMAND Server, 4G / LTE / WIMAX base-station, satellite connectivity, 200 terminals and all the necessary components. Apart from local private 4G network real-time satellite connectivity allows complete remote control from a remote location (e.g. Communication Headquarters, theater of operations etc.).

Learn More

Unmanned Aerial Systems and Counter Drone

LONG RANGE UAV

LONG RANGE UAV

UAV operation allows for seamless flight with minimum human interference and error. We beat industry standards in flying, command and information delivery. Our UAS is simple, ergonomic, heavy-duty and efficient. We provide a range of payload solutions and integrate any required.

Learn More
TACTICAL UAS

TACTICAL UAS

When the mission is critical and danger looms ahead, the most powerful weapon we can give our warfighters is information. To protect themselves, protect civilian life, and tailor their response to the threat, commanders and troops on the ground need superior tactical intelligence, surveillance and reconnaissance (ISR) - and they need it on demand. Our portfolio of small, unmanned aircraft systems (UAS) meet that demand, delivering systems with unrivaled flexibility and capability.

Learn More
Holistic solution for securing, detecting and counter measurements

Holistic solution for securing, detecting and counter measurements

At a time when airspace is becoming more crowded, safety and security must be achieved both to guard against the threat of drones being used for criminal and terrorist purposes—and in order to unleash the untold benefits of myriad drone-based services— CDP is the airspace awareness and security platform that provides all the tools necessary to create safe skies. CDP provides the best end-to-end solution possible for the detection, intention determination and integrated response and reporting of drone-based attacks. No other solution globally controls the technology end-to-end to affect a robust and maintainable solution that works. CDP is a comprehensive platform for airspace awareness and security that provides three essential elements of airspace management. Comprehensive coverage: The ability to detect all airborne objects day and night within a protected airspace and discern between threats and non-threats. Safe mitigation options: An integrated response to airspace breaches or potential threats with various levels of severity. Powerful, easy-to-use management: Built to scale for growing coverage, SkyDome provides a simple user interface for configuration and real-time mobile alerts and complete airspace history to recover quickly from an incident.

Learn More

Tactical Targeting Platform

EYETAC TACTICAL TARGETING PLATFORM

EYETAC TACTICAL TARGETING PLATFORM

EYETAC is proven platform and its modules are heavily tested in NATO and military camps. EYETAC is fully interoperable with Aerovironment’s sUAVs, Airbus Optronics LRFs, i-BEAM ,BFT radios , Extant IDM TDLs , L3 Rovers. EYETAC forwards targeting data achieved via the 4DAR process , directly to various Ground ,Maritime and Avril weapon platforms. EYETAC transmits the targeting data to A/C , H/P, MLRS battalions or any platform that can accept geographic coordinates for targeting purposes. EYETAC UDL is the only universal data link that can be installed in any legacy aerial platform, converting it form a no-datalink a/c or h/c to a fully enabled data striking unit.

Learn More

Cyber Defense and Security

ARTIFICIAL INTELLIGENECE CYBER DEFENSE

ARTIFICIAL INTELLIGENECE CYBER DEFENSE

Using proprietary machine learning and AI algorithms, the system passively analyzes raw network traffic to form an evolving understanding of ‘normal’ for every user, device, and subnet in an organization. Without presuming to know in advance what activity is ‘malicious’ or not, independently learns to detect significant deviations and immediately alerts the organization to emerging threats, from subtle insiders and low-and-slow attacks, through to automated viruses like ransomware.

Learn More
MOBILE DEVICE PROTECTION

MOBILE DEVICE PROTECTION

Real-time intelligence feeds to security gateways protect against unknown malware, zero-day exploits and advanced persistent threats (APTs). Zero-day protection and advanced threat prevention against sophisticated 5th generation of cyber-attacks using patented multi-layered cyber security. End-to-end multi- layered cyber security protection for networks, endpoints, mobile devices, and cloud-based services.

Learn More
CELLPHONES AND TRANSMISSION DEVICES DETECTION

CELLPHONES AND TRANSMISSION DEVICES DETECTION

Accurate Detection - Future Proof - Multiple Alert Options. Deploy as a portable or network device with adjustable range.Zone Protectora and Zone Manager deliver real time protection with actionable intelligence. Active Monitoring Technology enables our customers to secure and protect their facilities, assets, and information worldwide.Zone Protector alerts and notifies as soon as a signal is detected. Secure classified information throughout your facility

Learn More
DOCUMENT RIGHTS MANAGEMENT

DOCUMENT RIGHTS MANAGEMENT

RightsManager enables best document security practices by allowing you to encrypt documents locally, so there is no need to upload unencrypted documents to an unknown server or file sharing site. You maintain complete control of your source files at all times.Once your files are encrypted, go ahead and share files securely through all the normal channels—email, website, intranet, cloud storage sites or removeable media. Recipients authenticate through a client/server interaction, denying access to any unauthorized recipients. With granular permissions policies for access, editing, printing and sharing, you can ensure recipients can only see what they need to.

Learn More
SECURE SIGN IN

SECURE SIGN IN

Protects against phishing, man-in-the-middle and replay attacks with strong authentication Incorporates FIDO-certified security protocols, including public key cryptography/ infrastructure (PKI) Ensures security key and biometric information never leave the mobile device; no server-side secrets or link-ability between services or accounts.Facilitates higher user adoption: no need to remember passwords, no manual typing Works with smartphones that consumers/employees use every day. Delivers a consistent user authentication experience to access various services

Learn More
CYBER CORE . THE CORPUSNET APPROACH

CYBER CORE . THE CORPUSNET APPROACH

Learn More

Face Recognition for Public Safety

SUSPECT RECOGNITION

SUSPECT RECOGNITION

Facial recognition and person identification from thousands of cameras and mobile devices. City streets, airports and railway stations, subway, transportation hubs, malls and government establishments, event venues and stadiums. Accuracy of more than 95% allows reliable identification of wanted individuals, even if they try to avoid surveillance cameras by looking away or covering their face. The ability to enroll an unlimited number of photos, per individual, further improves identification accuracy.

Learn More

COUNTER SMUGGLING AND OIL FRAUD PLATFORM

OIL MARKING

OIL MARKING

Novice patented marker technology which relies on SERS (Surface Enhanced Raman Spectroscopy) for detection. Uses ≥1 of a range of unique molecules at ppb (parts per billion) levels to mark fuel. Not possible to detect molecules with normal analytical techniques. Patented rights for producing stable silver colloidal nano-particles to increase the sensitivity of analysis by 5-6 times. Convenient for both Lab and Field Use. Specially developed SERS instrument. The markers can be detected with portable field instruments, which run on batteries or mains power. All SERS markers can be measured at one time and the analysis is specific to used markers. The results can be analyzed in the lab for detailed evaluation. The result of the analysis is clear, decisive (2- 3 mins/test) and fast.

Learn More

SAFE IN NIGERIA

AVAILABLE SOON

SAFE IN NIGERIA

SAFE IN NIGERIA

SAFE IN is an advanced service offered to visitors, patients , elders and anyone who needs help. Based in Unified Communications Platform, it combines the technology with 24/7 emergence center services. One click on the smartphone brings a command center to your service. No more who to call, when, why and so on. Connect your smartphone to your local 24/7 emergency center and enjoy professional services.

CORPUSNET ACADEMY

For National Security, Defense and Law Enforcement

All courses can be delivered locally

  • Abuja, Νιγηρία
  • 12 Bangui St, Wuse, Abuja, Nigeria
  •  09.00--17.00
I BUILT MY SITE FOR FREE USING