Consulting and Advisory Services
Includes the design and implementation of various security solutions such as firewall systems, intrusion detection systems (IDS), “active” content scanning engines as well as integration of diverse security Central management solutions such as Anti-virus systems, Intrusion prevention systems (IPS), Virtual Private Networks (VPN), “Strong” (two-factor) authentication systems and Public Key Infrastructure (PKI), Trusted Endpoint Security Solutions, Network Access Control (NAC) and Security Information and Event Management (SIEM).
Information Security and Maturity Assessments
Security Assessments based on ISO27001 and CIS Top20 CSC, including various levels of network penetration and vulnerability testing, Network and physical security analysis, Business continuity and disaster recovery, etc. It also includes a report indicating possible security exposures and recommendations for improvements.
Information Security Policy Design
The design, development and implementation of a comprehensive “Information Security” policy (including all related operational procedures documentation).
We offer various back up, Continuous Data Protection, Data Leakage Protection, Archiving and Cloud solutions to protect your data.
Secure Mobile Access
Networks have no boundaries, we can help define and develop your Mobility Security strategy. Secure your mobile data, Mobile device management, Unified communications & BYOD.
User awareness and customized Security Training, as well as product specific training.