We are able and ready to take all the necessary steps associated with the auditting of the current status, comparing with GDPR requirement, proposing the measures, changes and to define new processes to meet the requirements of the new european regulation on the personal data protection.
ANALYSES of risks, processes and informations
We offer consulting services with long experience and know-how. We provide analyses of risks, processes, ICT and information security, etc. We also introduce corporate ICT processes according to ITIL.
Introduction of an information security management process based on the value of the information assets of the company. The service focuses on analysing the information and data bases of the customer and the relation of the information to internal processes.
Problem & Incident Response as a Service (PIRaS) is a service that allows customers to detect, identify and locate problems or incidents in the information system environment and contact the persons authorised by the customer.
Provision of individual training programs with focus on proper behaviour in the information system, effective work with collaborative applications (e-mail, calendar, appointments, tasks, directory structure, file system) and basic security aspects when working with the information system of the customer.
A comprehensive SOC solution ensures the detection and launching of security incident processes in the IT infrastructure.
Network behaviour anomaly (NBA)
Unique technology of network behaviour analysis which allows the identification of threats which overcame the security on the perimeter or were introduced into the network in a different way.
Implementation of operational and security oversight, including log management. In operational oversight and log management, our activities are laid out in several parts and can be provided not only as a solution, but as a service as well (SaaS)
User behavioral analytics (UBA)
Blindspotter is a new generation IT security tool which analyses all user activity, including harmful events, occurring across all IT systems.
PRIVILEGED USER ACCESS MANAGEMENT (PIM/PAM)
Authorisation, authentication, and audit for administrator protocols. A transparent solution for the monitoring and access control of all activities of administrators, application administrators, users, outsourcing partners, external clients, etc.