top of page
plastve.png
header02.png

Safety
information systems

cyber-security.png

Our company solves the area of IT security on several levels. We are able to secure both end devices and border elements of the network. We can secure data so that it is resistant to Ransomware and at the same time monitor the entire infrastructure. We can train users to gain knowledge that will significantly reduce the possibility of company attacks and data loss. We can process data recovery plans and security documentation. Last but not least, we can install camera systems with advanced software features.

Overview of individual products and technologies:

Terminal equipment

  • Microsoft - CA, encryption, BitLocker

  • Antivirus - ESET

  • HP SureClick - HW protection

Network infrastructure

Border elements

  • Fortinet

  • CISCO

  • Juniper

  • Check Point

Penetration testing

  • internal / external

  • WiFi

  • www

  • stress tests

  • phishing

Monitoring

  • Zabbix

  • NAGIOS

  • SCCM

Backup

  • Virtual Machine Server Backup

  • Veritas Backup Exec

  • Cloud - Active Backup

  • Veeam

  • TSM

Documentation

  • Processing of DR plans

  • Cyber Security Act

  • ISO 27000

Object security

Camera systems

  • HIKVISION

  • DAHUA

Saving records
Extension of functionalities
  

  • license plate recognition

  • counting people

  • objects

  • temperature monitoring

Training of users

  • Internet threats

  • Safe behavior in the workplace

  • Risks of interchangeable equipment

  • Mobile phone security

  • Social networks

  • Social engineering

  • Secure password

  • Work at home and on the go

  • Public computers and WiFi networks

  • Handling of information

  • Harmful attachments

  • Internet links

  • Secure email communication

  • Ransomware

  • Digital footprint

  • File and multimedia sharing

  • Phishing

header01.png

Infrastructure deliveries
and support

header03.png

Complex deliveries of IRS systems

bottom of page