Safety
information systems
Our company solves the area of IT security on several levels. We are able to secure both end devices and border elements of the network. We can secure data so that it is resistant to Ransomware and at the same time monitor the entire infrastructure. We can train users to gain knowledge that will significantly reduce the possibility of company attacks and data loss. We can process data recovery plans and security documentation. Last but not least, we can install camera systems with advanced software features.
Overview of individual products and technologies:
Terminal equipment
Microsoft - CA, encryption, BitLocker
Antivirus - ESET
HP SureClick - HW protection
Network infrastructure
Border elements
Fortinet
CISCO
Juniper
Check Point
Penetration testing
internal / external
WiFi
www
stress tests
phishing
Monitoring
Zabbix
NAGIOS
SCCM
Backup
Virtual Machine Server Backup
Veritas Backup Exec
Cloud - Active Backup
Veeam
TSM
Documentation
Processing of DR plans
Cyber Security Act
ISO 27000
Object security
Camera systems
HIKVISION
DAHUA
Saving records
Extension of functionalities
license plate recognition
counting people
objects
temperature monitoring
Training of users
Internet threats
Safe behavior in the workplace
Risks of interchangeable equipment
Mobile phone security
Social networks
Social engineering
Secure password
Work at home and on the go
Public computers and WiFi networks
Handling of information
Harmful attachments
Internet links
Secure email communication
Ransomware
Digital footprint
File and multimedia sharing
Phishing