There is no doubt that such a sensitive material as information requires special treatment and information, and communication technologies (ICT) that are used for processing, storage and transmission throughout its life cycle. Request information and quotation See more
- Security consulting.
- Information security management systems.
- Risk analysis.
- Personal data security and compliance of regulations.
- Computer forensic analysis and investigation of incidents.
- Audits: techniques, data protection and compliance of regulations
- Managed security.
- Analysis, design and implementation of technical solutions.
- Systems and communications security.
- Penetration assessments.
- Data leak prevention.