
“Cybersecurity starts with physical protection. It doesn't matter how well we protect the server with a firewall if anyone can still walk into the server room.”


Most access control systems currently in use are no longer secure at all and rely on outdated technologies. A significant portion of these systems can be broken into with very simple tools. We also try to draw attention to this problem through articles and videos.


Assessing physical security is always tailored to the characteristics of the specific site and to the company's operation. We review the existing systems and map out the weak points. In the end, we provide recommendations that include technical, organizational, and human measures as well.


It is important to understand that there is no universal solution that fits everyone in exactly the same form. Every company has different priorities. The goal is always to close the biggest security gaps first and ensure that the level of protection is proportional to the real risk.
In this video, we show how easy it is to copy, emulate, and duplicate RFID cards with a Flipper Zero. We want to draw attention to the weak points of access control systems and the importance of NIS2. The Predor system provides end-to-end secure communication.
Váradi Márk
Orange1 Hungary Kft

“The Predor system brought a real breakthrough to our HR processes. The application fits our needs perfectly and supports our day-to-day work efficiently. The information we need is easy to access and clear to review, so our payroll processes run smoothly. Thank you for the effective solution and the professional support during implementation.”
Földesi Gergő Balázs
TTSped Kft

“A complex and sophisticated system that can provide the right solution for any company.”
Tótfalusi Roland
Gravitáció Kft

“An ideal solution for small and medium-sized businesses, providing up-to-date attendance data through a user-friendly interface.”
Váradi Márk
Orange1 Hungary Kft

“Since introducing the system, we have been able to monitor our employees' working hours much more effectively than with our previous solution. This further strengthens compliance with company policies and allows us to handle discrepancies proactively. Leviathan Solutions Ltd also provides custom options within the software, so we can tailor and fine-tune it to our own needs.”
Kovács Kristóf
KBP GROUP Kft

“We are very pleased to have found such a reliable partner for the implementation of our access control containers. Flexible communication and quick issue resolution are very important to us when operating systems like these, and today I can confidently say that the Predor team delivers on all of this. Excellent communication, fast and flexible administration, and a professional implementation team support our work. Thank you.”
Kristóf Péter
Galaktika Kft

“I can only recommend the system, backed by an excellent support team with a high level of helpfulness, flexibility, and continuous availability.”