Cyber security services:

  • User management and access rights management
    • Identity management (IDM), privileged identity management (PIM)
  • Ensuring data protection
    • Web / Data security
    • Data leakage protection (DLP)
    • Vulnerability assessment systems
    • Protection against OWASP top 10 in the form of security analysis and Web application firewall
  • Penetration testing
  • Stress testing in the form of DOS attacks on the application
  • Security testing and application analysis
  • Static and dynamic source code control
  • Security monitoring (SIEM)
  • Preparation of security projects and risk analyses
  • Assurance of compliance with legislation, norms and standards in the field of IT security
  • Security audits of information system properties
  • Business continuity management (BCM), development of recovery plans and business continuity plans (DRP/BCP)
  • Information security training and education
  • Preparation for cybersecurity audit pursuant to ISO 27001 and Act No. 69/2018 Coll. on Cybersecurity and on amendment of certain acts
  • Creation and preparation of security projects