GDPR (GENERAL DATA PROTECTION REGULATION) is a comprehensive set of personal data protection rules. IT is the european regulation that is unifirmly valid in all EU countries.

Do you need any information on GDPR?

AXENTA A.S. has years of experience in IT security.

Trust in us even in GDPR

We are able and ready to take all the necessary steps associated with the auditting of the current status, comparing with GDPR requirement, proposing the measures, changes and to define new processes to meet the requirements of the new european regulation on the personal data protection.

Security


Processes

Monitoring

  • GDPR

    We are able and ready to take all the necessary steps associated with the auditting of the current status, comparing with GDPR requirement, proposing the measures, changes and to define new processes to meet the requirements of the new european regulation on the personal data protection.

  • ANALYSES of risks, processes and informations

    We offer consulting services with long experience and know-how. We provide analyses of risks, processes, ICT and information security, etc. We also introduce corporate ICT processes according to ITIL.

  • Cybernetic security

    Introduction of an information security management process based on the value of the information assets of the company. The service focuses on analysing the information and data bases of the customer and the relation of the information to internal processes.

  • INCIDENT RESPONSE

    Problem & Incident Response as a Service (PIRaS) is a service that allows customers to detect, identify and locate problems or incidents in the information system environment and contact the persons authorised by the customer.

  • TRAINING

    Provision of individual training programs with focus on proper behaviour in the information system, effective work with collaborative applications (e-mail, calendar, appointments, tasks, directory structure, file system) and basic security aspects when working with the information system of the customer.

  • SOC

    A comprehensive SOC solution ensures the detection and launching of security incident processes in the IT infrastructure.

  • Network behaviour anomaly (NBA)

    Unique technology of network behaviour analysis which allows the identification of threats which overcame the security on the perimeter or were introduced into the network in a different way.

  • Log Management&SIEM

    Implementation of operational and security oversight, including log management. In operational oversight and log management, our activities are laid out in several parts and can be provided not only as a solution, but as a service as well (SaaS)

  • User behavioral analytics (UBA)

    Blindspotter is a new generation IT security tool which analyses all user activity, including harmful events, occurring across all IT systems.

  • PRIVILEGED USER ACCESS MANAGEMENT (PIM/PAM)

    Authorisation, authentication, and audit for administrator protocols. A transparent solution for the monitoring and access control of all activities of administrators, application administrators, users, outsourcing partners, external clients, etc.