BECOME THE GUARDIAN OF YOUR DATA|PROCESSES|TECHNOLOGY|PROJECTS
Professional cyber security consulting and management.


KEEP YOUR KNOW-HOW SAFEí
How do we protect your company’s confidential data?
WE START WITH AN INTERVIEW
BUILDING ON TRUST
WE PLAY FAIR
We provide our services independently and without conflict of interest. We are not bound by any security product provider, system integrator, interest groups or shareholders.
WE OPERATE GLOBALLY
PORTFOLIO OF SERVICES
Our range of services includes consulting, extensive security solutions and long-term partner relationships. All the services we provide comply with legislation and international standards.
ISMS CONSULTING
Assessment of the degree of compliance with standards
Proposal for the organisational structure
Definition of processes
Creation of the necessary documentation
SECURITY AUDITS
We will determine whether your processes, technologies, and projects meet information security standards. We will conduct an in-depth review of your company’s security status and prepare you for necessary certifications, external audits or inspections. Furthermore, we provide:
Internal audits according to the ISO 27001 standard
Audits for the data centre and cloud environment
Audits of measures for the protection of personal data
Cyber security audits
Supplier audits
BCMS audits
OUTSOURCING AND EXTERNAL COOPERATION
Business checks and analytics
Maintenance of security documentation
Monitoring new threats and risk status
ISMS EDUCATION AND TRAINING
We will improve the security awareness of your employees. Our training programme is aimed at increasing the information security awareness of employees and acquiring the proper habits. We provide:
In-person trainings and webinars
E-learning courses
Phishing simulations
Educational campaigns
BUSINESS CONTINUITY MANAGEMENT
Process failure
Loss of premises
Loss of key personnel
Supplier failure
PENETRATION TESTING
We uncover cyber vulnerabilities of assets in an environment of threats and constant change. Our penetration testing identifies organisational and technical vulnerabilities and identifies necessary measures. We provide: