- Security analysis
- Penetration test
- Expertise
- Certification of computer-based systems (CBS)
- Certification of ISPD
- Preparing for the certification of software and equipment
- Nonconformity to requirements
- Writing concepts, policies, strategies and regulations of IS
- Preparation of IS templates and instructions to develop awareness-raising programs
- Description of business processes related to core activities in the context of the IS
- Development of techniques and a set of Private Policies for IS
- Certification of computer-based systems (CBS)
- Certification of ISPD
- Preparing for the certification of software and equipment
- Nonconformity to requirements
Design And Implementation of IS Systems
Classic IS Systems
- Antivirus and Anti-spam
- Firewalls (IPS, IDS)
- Public keys
- Encryption of VPN
- Database IS
- Prevention of unauthorized access
- Secure Web Gateways
- IS Monitoring (SIEM)
- Integrity Software
- Data Leak Prevention (DLP)
- Protection Analysis
- Network Access Control (NAC)
- Electronic keys life-cycle management
- Multi-factor authentication
- Data encryption for storage
- Device Control
- Restrictions on the running applications (Application Control)
- Data backup
IS & IT Solutions
- Big Data Security Intelligence
- IAM / IAG
- Security management for mobile devices (MDM / EMM)
- Virtualization Security
- Authorization Centres
- Anti-Fraud Protection
- Firewall Configuration
- Interaction of unstructured data (Data Governance)
IS Best Practices
- Security-as-a-Service
- Protection against targeted attacks
- Forensic Analysis and Incident Response
- ERP Security
- Database Security
- Web applications security audit
- Web applications security
- Code security audit
- Print Surveillance
- Wireless Intrusion Prevention System (WIPS)
- Information Rights Management (IRM)
- Systems of passive analysis
- Privileged access monitoring
- User Actions Monitoring (UAM)
- Security of terminals, ATMs, informants
- Network Behavior Anomaly Detection (NBAD)
- Anti-DDoS Shield (Appliance / model SaaS)
- Hardware Security Modules (HSM)
- Governance, Risk and Compliance (GRC)
- Cloud Data Synchronization
- Equipment & Software Settings Security
- PCS
- Unidirectional Network (Data Diode)