- Network security
- IT infrastructure security
- WEB application protection
- Comprehensive information security audit
- A set of measures for compliance with requirements
Network security
- Firewall (NGFW, FW, UTM, IPS / IDS)
- Building virtual private networks (VPN)
- Network Access Control (NAC)
- Network Anomaly Detection (NAD)
- Systems for analysis and optimization of firewall policies
IT infrastructure security
- Email Security
- Trusted Boot Tools
- Antivirus protection tools
- Security analysis scanners
- Internet access protection
- Multi-factor authentication (MFA)
- Honeypot
- Advanced Endpoint Threat Detection (EDR)
- Centralized Authentication Management Systems
- Public Key Infrastructure (PKI)
- Protecting corporate resources over TLS VPN
- Protection against targeted attacks
- Protecting your virtualization environment
WEB application protection
- Web Application Firewall
- Source code security audit
- Ensuring the cybersecurity of the APCS:
- Industrial Protocol Anomaly Analysis (INAD)
- Endpoint protection
- Industrial firewalls
- Unidirectional gateways
Comprehensive information security audit:
- Audit of processes and information flows
- Audit of existing information security systems
- Analysis of the effectiveness of the applied means and methods of information protection
- Security audit of IT infrastructure and information systems