Offer
Products and implementations
We support implementation carefully selected IT tools related to security management and critical assets constant monitoring.
Within the technological solutions we offer number of systems and solutions, including:
• log monitoring (SIEM)
• incident orchestration (SOAR, TT)
• intrusion prevention and detection (IPS, IDS)
• data loss prevention (DLP)
• network, database and user activity monitoring
• secure storage and communication
• and many more.
Cybersecurity tools development
We develop cybersecurity solutions that support our own, internal and our clients activities related to cybersecurity:
• Audit management tool, supports audit proces in organization with framed model, role management, audit scheduler, information database
• Penetration test solution, with number of world best class engines empowered with dedicated product developed to provide ability to comprehensive testing
• Vulnerability management platform, combines number of worldwide vulnerability databases with monitoring and reporting mechanism give the ability to manage threats in proactive manners
• Threat intelligence hub, related to internal and external threat information management tool with clients constant feeds mechanism
Monitoring of wireless networks
We provide comprehensive implementations in the field of automation and information technology
a. Information technologies
• Implementation of turnkey solutions
• Construction of ICT systems
b. Automation
• Implementation of production lines
• Optimization of production
• Digitization
Services
Audits and implementation of standards
We offer physical, technical and environmental security audits and implementations in the following areas:
• Cybersecurity incident management maturity audit (based on the SIM3 model)
• Financial audits (ECB, KNF and other industry standards)
• Recommendations and regulations of the European Union, including: Information security in the network, general data protection act, national interoperability framework
• Anti-corruption and fraud prevention systems, information classification systems, information and data retention,
• Any other systems and models to be used in accordance with local regulations and needs
Security management
Based on products and services, we provide our clients with cybersecurity continuous management services:
• Tailored and tailored services
• The package includes, but is not limited to:
a) Configuration and storage of logs,
b) Log monitoring and correlation
c) Managing vulnerabilities, alerts and incidents
d) Monitoring of threats
• Additional services include training, consultation, awareness raising, operations and coordination support.
Telecommunication
• Telecommunications services
• Solutions (SMSC, provisioning and others)
• Creation of a virtual operator