GWIS is a leading communications security company, serving the needs of customers in Malaysia and worldwide. Our main activities are the provision of data and communications security services, training and other interconnected IT services. We are a leading communications security consultant, providing services and training to clients, small and medium sized enterprises and the public sector. Globally, we supply managed IT services to multinational corporations, domestic businesses, and national and local government organizations.

About Us

In an interconnected environment, more information is available to more users including people outside your organization. The challenge is maintaining your data secure, ensuring that the right people have fast access to the information they need, and being able to predict and respond to security threats. Some of the well-known threats are viruses, intruders, ad-hoc attacks and coordinated criminal activities. Other more serious threats include Advanced Persistent Threats (APT).

A data breach is the deliberate or unplanned disclosure of secure information to a distrusted entity. Other terms for this phenomenon include data leakage and also data spill. Incidents range from cooperative attack by malicious hackers, with the backing of criminals or governments, to a cavalier disposal of used computer equipment or data storage media. Data breaches may involve financial information such as credit card or bank details, personal health information and secrets of corporations that give a manufacturer an advantage over the competition or intellectual property. Millions of individual records containing sensitive personal information were involved in security breaches excluding incidents where sensitive data was apparently not actually exposed.

GWIS provides a range of technologies, professional services, training, and services to optimize security for your interconnected business. GWIS will work with your personnel to assess security threats, build layered defenses into your IT environment and communication systems. Our plans provide a secure and fast response to protect your data and your reputation.



To become a global state-of-the-art information security company that strives to prevent  information leakage and protect the privacy and assets of individuals and organizations.



  • To utilize state-of-the-art procedures and algorithms for information security solutions,
  • To develop both hardware and software solutions meeting the needs of the market,
  • To provide consultancy and training services to clients for effective practice of information security and data leak prevention.

Certified Trainer by Pembangunan Sumber Manausia Malaysia under the Ministry of Human Resources Malaysia.
Registered Real Estate Agent under The Board of Valuers, Appraisers and Estate Agents Malaysia.
Michelle Chan practiced as Registered Estate Agent since 1995 and obtain MBA in the year, 2010.
She in also the key personal  in a development company for the housing project in the year 2012 to 2015.
Completed courses for digital threats and cyber security – 2014.
Train the trainer by PSMB- 2016
Professional courses:
Malaysia Company Law by Brickfield College, Malaysia.
Diploma in Estate Agent Malaysia

Prof. Magdy Saeb received the BSEE. School of Engineering, Cairo University, in 1974, the MSEE, and Ph.D. Degrees in Electrical & Computer Engineering, University of California, Irvine, in 1981 and 1985, respectively. He was with Kaiser Aerospace and Electronics, Irvine California, and The Atomic Energy Establishment, Anshas, Egypt. He is a professor emeritus & former head of the Department of Computer Engineering, Arab Academy of Science, Technology & Maritime Transport, Alexandria, Egypt. He was on leave working as a principal researcher in the Malaysian Institute of Microelectronic Systems (MIMOS). Now he is the CTO of Great Wall Information Security, Kuala Lumpur, Malaysia. His current research interests include Cryptography, FPGA Implementations of Cryptography and Steganography Data Security Techniques, Encryption Processors, Mobile Agent Security. He holds five Intellectual Property Patents in the area of cryptography. He has published more than 70 technical peer-reviewed papers in the information security area.


Training of your company's personnel, we believe, is as important as installing the right equipment and using the right security protocols. Attacks based on social engineering is much more common than most people conceive.