// DELIVERY, IMPLEMENTATION AND SUPPORT IN THE FIELD OF INFORMATION SECURITY

Automated, Managerial and Organizational Solutions

Protection against Malicious Code

> Antivirus, antispam
> Vulnerability scanner
> Automatic pentester
> Protection of web applications
> Protection at DBMS level
> Traps for intruders

Network
Security

> Firewalls
> Network traffic analysis
> Anti DDOS
> IPS
> Wireless AP security
> NAC

End-point
Security

> Workstations
> Mobile devices
> Servers
> Virtual machines
> Containers

Logical
Access

> Control of privileged users
> Access control
> Multi-factor authentication
> Control of access to unstructured data

Critical Documents
Protection

> Virtual Data Room
> Marking of confidential information
> DLP

Consulting


> Inf. security risk management
> Investigations
> ISMS
> Development of policies and procedures
> Preparation for certification
> Independent assessment and audit of systems