Web Application Firewall

The web portals, new functions, lots of various applications are always changing and the number of vulnerabilities of web technologies are increasing constantly. The WAFs are the most up to date technologies that protect your systems even without a complicated development cycle.

Social Engineering

Our experts have lots of experience with verifying and evaluating the level of awareness of information security of employees by means of email campaigns with a fake testing code, media distributions (USB, CD/DVD, etc.) with this code, or via manipulative phone calls to approved respondents.

Risk Analysis

The risk analysis serves to appraise the actual state of security and identify risks that the system faces. It represents an important resource of information for decision-making about security investments.

Information Security Training

Our specialists can draw up a number of workshops about information security, tailored to your individual needs, that are suitable for regular users, IS administrators, as well as top management.

SIEM

We offer SIEM tools from reputable producers for monitoring and analysis of the logging records generated by a number of systems found in the organization’s infrastructure. Together, we go over the project phases of the logging infrastructure analysis, selection of a suitable SIEM tool, implementation, documentation and subsequent support and development.

Sandbox

Protect your company against malware using zero-day or unknown vulnerabilities. We will implement a modern solution that will guard you against this threat.

Vulnerability Management Systems

Are you uncertain if the assets of your information infrastructure may contain a vulnerability resulting from a incompatible configuration or the absence of security updates? If so, we would like to recommend an implementation of a VMS tool (Vulnerability Management System) thanks to which you will gain a crucial overview of the risks related to the individual components of your network.

NBA

Are you looking for a way to identify changes in the network effectively, or detect new types of malware or completely unknown attacks? With the help of Network Behavior Analysis (NBA) products our team is ready to assist you with this process.

Penetration Tests

Penetration tests examine the level of the organization’s information security and the ICT resistance to existing cyber threats by simulating a hacker’s attack on the computer network, web, or mobile application.

Security Administrator Outsourcing

Don’t you have the sufficient capacity for solving security issues on your own? We offer you the services of our experts, who are fully devoted to security. Our experts can effectively fulfill tasks according to your individual needs.

ISMS

We have longterm practical experience in the field of ISMS as well as in related fields. If you want or need certified ISMS, we are here for you. We can help you to propose a system of information security management quickly and effectively, and engage it throughout the entire organization.

Mobile security

In the field of mobile technologies our specialists can offer you penetration tests of mobile applications, consultancy during its development, and subsequent analysis of the source code. At the same time, we can help you with the deployment or modification of the administration of the company’s mobile devices, that means MDM technology and company policies (BYOD/CYOD).

Hardening

System and platform hardening is an elementary security measure that is able to protect information systems and applications from abuse. We can provide hardening policies and propose how to implement them into practice. At the same time, we provide check-ups effectively (and automatically) to make sure they are being observed.

BCM

We can help you to identify the most crucial company processes and related vital personnel. We can point out the critical components of the ICT infrastructure, as well as the important reports and documentation, without which your business couldn’t keep running in case of emergency. Then we can help you create recovery plans in case something goes wrong. And if anything goes wrong we will assist you with managing the critical situation. We have plenty of experience in this area, and you can find our results in the references.

Document Classification

This is a tool which will solve the right classification of your documents for you. It is easy to implement and it increases the effectiveness of DPL systems.

Data Loss Prevention

The most valuable property for a company is data. Imagine how your company’s reputation would change if your financial reports, proposals, and clients’ records got into the hands of your competition, or they were leaked to the public. The system of DPL protects sensitive information against targeted attacks, as well as from the company’s own employee abuse.

Firewall

Access management based on an IP address is out of date today. You should control the accesses at a higher level in terms of users and groups. Our team doesn’t only offer implementation, but mainly a sophisticated administration of firewalls.

Anti Fraud System

The AFS is a complex solution ensuring the protection of web internet banking applications and their users against cybercrime, fraud detection in the online environment, and the logging of users’ activities.

IS Audit

We execute information security audits from the procedural and the technical points of view. Our team has wide competencies for managing almost all the requirements for verifying compliance regarding either the Cyber Act, ISMS, personal data protection, or other specialized IT standards. We can also provide the customers’ audit at your suppliers. Don’t hesitate to contact us, and we will put together an individual IS audit for you for a reasonable price.

Secure Development

If security is not an integral part of the software development life cycle (SDLC – Software Development LifeCycle), then the security vulnerabilities and holes occur on a regular basis. An after-effect security solution at the end of the development usually causes subsequent expanses. Due to the Secure SDLC, we apply security principles and standards throughout the course of the entire life cycle of the software’s development, and we help to identify and eliminate the potentially vulnerable spots of the applications in time.

Security Documentation

We are ready to assist you in drawing up appropriate safety documentation, which will become the keystone of information security at your organization.

Antivirus Protection

Just like you never stop locking your door after you have an alarm installed, you can’t skip good quality antivirus protection if you want to be safe. We represent ten of the biggest world brands, and we offer high quality technical support.