> Control of privileged users
> Access control
> Multi-factor authentication
> Control of access to unstructured data
Critical Documents Protection
> Virtual Data Room
> Marking of confidential information
> DLP
Consulting
> Inf. security risk management
> Investigations
> ISMS
> Development of policies and procedures
> Preparation for certification
> Independent assessment and audit of systems