Kontakty / Contacts

Implementation

Antivirus Protection

Protect your system from viruses and other malicious software (worms, Trojans, spyware, ransomware...). We offer a wide range of quality solutions, including comprehensive service. We will suggest the optimal solution, installation and remote management. We are GOLD partner and supplier of ESET products, whose security solutions are regularly ranked at the top of independent tests.

24/7 Business Critical Support

We offer continuous (24/7) expert technical support for your systems in cases where a reduction in functionality would have a significant negative impact on the operation of your company or the services you offer. Resolving the request by the next business day is integral to this service.

Read more

Infrastructure and Network Architecture

Restructuring and reconfiguration of your logical or physical network in accordance with security requirements (e.g. separation of internal and external networks, DMZ), installation and configuration of new security features (e.g. firewall, IPS/IDS), expansion of your network according to your current needs (e.g. optimization of data flows, performance increase, wireless coverage...). We have long-term experience in installing and managing cloud solutions (e.g. Cisco Meraki).

Read more

Monitoring and Proactive Protection

Optimize your system's logging activities in accordance with local security requirements (e.g. availability or confidentiality priority). Log backup solutions. Implementing solutions that provide proactive protection with the benefit of predicting problems before they actually occur. For example alerting on a missing security update (reducing the risk of exploiting a newly found vulnerability) or alerting on unreadable sectors on HDDs (allowing early backups to reduce the risk of data loss).

Data Protection (Encryption)

Wireless and physical network security, HDD encryption, implementation of security policies (e.g. username and password policies, user training). These and many other measures will help you secure your system from sensitive data leak (e.g. login credentials, personal data, company know-how, trade secrets, etc.).

Data Loss Prevention (DLP, DRP)

Information assets (data) can usually be considered the most valuable part of a system. For most organizations, their long-term unavailability (or even loss) would have very serious consequences, for many of them even liquidation. For this reason, we consider the area of data protection against loss to be one of the pillars of cyber security. We offer implementation and management of a wide range of solutions providing data backup and recovery for end stations, network communications and servers. We are specialists in cloud solutions. Of course, we assist in data classification as well as the development of a backup and recovery plan (DRP).

Read more

E-mail Protection

Protect your e-mail inbox from unsolicited mail (SPAM).

Mobile Device Management (MDM)

A system for unified and transparent management and security of all mobile devices in the organization (e.g. personal and corporate mobile phones, tablets). Support for a wide range of devices and all common operating systems (iOS, Android, Windows Phone, BlackBerry). Easy device removal in case of loss or theft.

Web Filter

Installing a web filter allows you to control what websites users are visiting on the Internet. Depending on your configuration, this product can make several issues much easier to deal with. For example protection from malware (sites with malicious content, e.g. ransomware), sensitive information leaks (phishing sites), protection of children and minors from inappropriate content (pornography and violence content), protection from employee procrastination (e.g. social networking sites).



TOP