
“Cybersecurity starts with physical protection. It doesn't matter how well we protect the server with a firewall if anyone can still walk into the server room.”


Most of the access control systems currently in use are no longer secure and use outdated technologies. A significant portion of these systems can be easily hacked with very simple tools. We aim to raise awareness of this issue through articles and video materials.


The assessment of physical security is always tailored to the specific site conditions and the company's operations. We review existing systems and identify weak points. Finally, we provide recommendations that include technical, organizational, and human measures.


It is important to note that there is no universal solution that fits everyone perfectly. Each company has different priorities. The goal is always to address the most significant security gaps first, and ensure that protection is proportional to the actual risk.
In this video, we demonstrate how easy it is to copy, emulate, and duplicate RFID cards using a Flipper Zero. We aim to highlight the vulnerabilities of access control systems and the importance of NIS2. The Predor system enables end-to-end secure communication.
Váradi Márk
Orange1 Hungary Kft

“The Predor system brought a real breakthrough to our HR processes. The application fits our needs perfectly and supports our day-to-day work efficiently. The information we need is easy to access and clear to review, so our payroll processes run smoothly. Thank you for the effective solution and the professional support during implementation.”
Földesi Gergő Balázs
TTSped Kft

“A complex and sophisticated system that can provide the right solution for any company.”
Tótfalusi Roland
Gravitáció Kft

“An ideal solution for small and medium-sized businesses, providing up-to-date attendance data through a user-friendly interface.”
Váradi Márk
Orange1 Hungary Kft

“Since introducing the system, we have been able to monitor our employees' working hours much more effectively than with our previous solution. This further strengthens compliance with company policies and allows us to handle discrepancies proactively. Leviathan Solutions Ltd also provides custom options within the software, so we can tailor and fine-tune it to our own needs.”
Kovács Kristóf
KBP GROUP Kft

“We are very pleased to have found such a reliable partner for the implementation of our access control containers. Flexible communication and quick issue resolution are very important to us when operating systems like these, and today I can confidently say that the Predor team delivers on all of this. Excellent communication, fast and flexible administration, and a professional implementation team support our work. Thank you.”
Kristóf Péter
Galaktika Kft

“I can only recommend the system, backed by an excellent support team with a high level of helpfulness, flexibility, and continuous availability.”