Cybercrimes have cost millions of dollars to the global economy last year, and according to statistics, this amount will increase rapidly in the next few years. These numbers were built up from losses of many companies, now every one of them has imposed greater information protection procedures. Cyber security is becoming increasingly more relevant to the modern era where everything is connected and relies on internet connectivity. To prevent these crimes, our IT Security department provides clients with our Cyber Protection Services.
Identification of security needs - Our IT specialists starts this process by collecting information about the data which should be protected, then performing Systems Penetration Tests, in other words a penetration test entering the system just as a hacker would, by completing this process our IT specialist will detect security faults in the system. Information gathered as a result of the penetration tests will be used to create the desired cyber protection environment.
List of services:
(Controlling, Proof of concept)
- Physical network environment (physical access from outside) – cabling and construction security
- Network infrastructure devices (switches, hubs, hardware firewalls, wireless access points, load balancing systems, vlan setups, DMZ)
- Computer systems and servers (operating system, Authentication, Admin / User strategies, Messaging (Mail, Messenger, VoIP, Video Conferencing), Remote access)
- Services (SMB, FTP, Databases, IIS, VPN, RDP, Backup Services)
- Web services (Websites, Web applications, Database back-ends, Cloud Services)
- Source Code Analysis for projects under development (PHP, HTML, JAVA, JAVA Script, Objective C, VB.Net, C#, WPF, WinForms, Web-Forms, ASP.Net)
(White hat, Grey hat, Black hat)
- Network (Router, Switches, Access Point, Hardware Firewalls)
- Security Systems (Surveillance Cameras, Remotely accessible security system – intrusion/fire alarm or access control systems)
- Company Servers (Data Centre's, Mail Server, File Sharing Systems, IIS Systems)
- Work Stations or Terminals
- Mobile Devices
- Websites / Web application
- Web services
- Cloud Storages
- Webmail Server
- Web Accounts (Social Media, Bank, Cloud Storage, Mail, Online Shop / Stores)
- Saving evidence
- Discovering problems
- Closing holes
- Data Restoring
Cyber Protection
Our Partnerships
Our partnerships around the world give us the opportunity to provide international security services.
Fortis cadere - Cedere non potest