There is no doubt that such a sensitive material as information requires special treatment and information, and communication technologies (ICT) that are used for processing, storage and transmission throughout its life cycle.
Request information and quotation
- Security consulting.
- Information security management systems.
- Risk analysis.
- Personal data security and compliance of regulations.
- Computer forensic analysis and investigation of incidents.
- Audits: techniques, data protection and compliance of regulations
- Managed security.
- Analysis, design and implementation of technical solutions.
- Systems and communications security.
- Penetration assessments.
- Data leak prevention.