• Security analysis
  • Penetration test
  • Expertise
  • Certification of computer-based systems (CBS)
  • Certification of ISPD
  • Preparing for the certification of software and equipment
  • Nonconformity to requirements
  • Writing concepts, policies, strategies and regulations of IS
  • Preparation of IS templates and instructions to develop awareness-raising programs
  • Description of business processes related to core activities in the context of the IS
  • Development of techniques and a set of Private Policies for IS
  • Certification of computer-based systems (CBS)
  • Certification of ISPD
  • Preparing for the certification of software and equipment
  • Nonconformity to requirements

Design And Implementation of IS Systems

Classic IS Systems

  • Antivirus and Anti-spam
  • Firewalls (IPS, IDS)
  • Public keys
  • Encryption of VPN
  • Database IS
  • Prevention of unauthorized access
  • Secure Web Gateways
  • IS Monitoring (SIEM)
  • Integrity Software
  • Data Leak Prevention (DLP)
  • Protection Analysis
  • Network Access Control (NAC)
  • Electronic keys life-cycle management
  • Multi-factor authentication
  • Data encryption for storage
  • Device Control
  • Restrictions on the running applications (Application Control)
  • Data backup

IS & IT Solutions

  • Big Data Security Intelligence
  • IAM / IAG
  • Security management for  mobile devices (MDM / EMM)
  • Virtualization Security
  • Authorization Centres
  • Anti-Fraud Protection
  • Firewall Configuration
  • Interaction of unstructured data (Data Governance)

IS Best Practices

  • Security-as-a-Service
  • Protection against targeted attacks
  • Forensic Analysis and Incident Response
  • ERP Security
  • Database Security
  • Web applications security audit
  • Web applications security
  • Code security audit
  • Print Surveillance
  • Wireless Intrusion Prevention System (WIPS)
  • Information Rights Management (IRM)
  • Systems of passive analysis
  • Privileged access monitoring
  • User Actions Monitoring (UAM)
  • Security of terminals, ATMs, informants
  • Network Behavior Anomaly Detection (NBAD)
  • Anti-DDoS Shield (Appliance / model SaaS)
  • Hardware Security Modules (HSM)
  • Governance, Risk and Compliance (GRC)
  • Cloud Data Synchronization
  • Equipment & Software Settings Security
  • PCS
  • Unidirectional Network (Data Diode)