Information security consulting services

It is in the interest of all businesses to ensure the security of data, the continuity of IT systems and the prevention of IT disaster. The purpose of BCP/DRP Plan is to minimize operational risks and minimize the risk of unforeseen events due to tight competition and legal compliance.

Regulations of information technology security

We examine how well the company operates in accordance with international standards / recommendations, statutory regulations and corporate regulations. In addition, we examine the practical implementation of the policies, especially regarding security (data protection, eligibility) and emergency situations.

Business continuity and disaster recovery plans (BCP/DRP)

It is in the interest of all businesses to ensure the security of data, the continuity of IT systems and the prevention of IT disaster. The purpose of BCP/DRP Plan is to minimize operational risks and minimize the risk of unforeseen events due to tight competition and legal compliance. Verifying and managing information technology risks In IT risk analysis and risk management, we strive to assess and reduce the company’s operational risks. Existing security measures will be considered and then we determine how vulnerable the systems are to the different types of threats.

Availability of IT systems

In doing so, we review the terms of the SLA contract and assess the quality of IT services (backup, archiving, performance, availability), with particular reference to contracts with external partners and suppliers.

IT risk analysis and risk management

Through IT risk analysis and risk management, we strive to assess and reduce the company’s operational risks. Determine how vulnerable systems are to different types of threats, taking into account existing security measures.

Information vulnerability tests

Network Vulnerability Assessment is designed to detect known vulnerabilities after recognizing and categorizing all IPbased host (PC, active device, etc.) on the internal and DMZ network. We are able to perform vulnerability tests with various software and tools, on a standard basis, eg. ISO 17799, 27002 PCI-DSS, etc. After performing the vulnerability test, we provide a detailed report broken down to the host found, with the results and suggestions for the results. This detailed report is beneficial for IT executives, who can instantly minimize their security risks on business systems with immediate solutions. We prepare a summary of the vulnerabilities found for managers and make suggestions for their elimination.

Ethical Hacking

Ethical hacking is a security testing process on the company’s IT system that adresses critical security vulnerabilities, thus reducing the success of malicious attacks. The vulnerability test gives you an overview of the current system status.

Corporate Mobility Strategy, Mobile Device Security

This area is especially important after the Bring Your Own Device (BYoD) concept has appeared, with corporate and private mobile devices in the organization’s network. The essence of the consultancy is to examine the current mobility strategy and if needed to develop a new strategy that supports both the access to work mobility and information security aspects.

Information security education

Information security awareness of employees and suppliers is key to information security. Modern data leakage prevention tool and IT risk management mechanism are not enough, employees do need to understand and to take into account the corporate security aspects of information security. We undertake the training of information security, the preparation of educational material for the target group in the company, and we have an information security awareness software that teaches the employees with the help of simulation techniques.

Information security audit

We undertake various information security audits and preparation for audits, for example:

  • Preparation and audit of information security management system certification (based on ISO 27001 standard)
  • Application Audit
  • Preparation for PCI DSS audit
  • Software Licensing Audit
  • Business Continuity Audit
  • IT Operations Audit
Company Mobility solutions

With the rapid increase in the number of mobile devices (tablets, smartphones), the solution for storing and accessing information is increasingly coming to the fore. Our mobility solution consists of all of the following elements or some depending on our customers’ needs:

  • Creating a corporate mobility strategy, mobile device policy
  • Enterprise mobility tool (Enterprise Mobility Management, Mobile Device Management (MDM)) transport, integration of network
  • System Support Our MDM solution is a mobile mobility solution provided by MobileIron (https:// www.mobileiron.com/), a market leader that can be used in a modular structure that is tailored to the needs of our customers.