service-1

Information networks’ and systems’ vulnerability scanning

We render informational and analytical services on vulnerabilities’ detection in information systems and networks, web applications and other IT infrastructure components, and their elimination in order to minimize risks of Intranets’ penetration, violation of integrity, confidentiality or accessibility for information assets. We also render services of scanning external and internal IT infrastructure, web applications and individual information systems to detect the vulnerabilities and work out the report with recommendations on vulnerabilities’ elimination and causes of their occurrence.

service-2

Assessment of compliance with CS requirements

We conduct detailed, independent investigation allowing us to assess the current condition of the Company’s cyber security in accordance with certain criteria, and we provide advices on planning further measures to increase the protection level and trace current problems. We develop an efficient program for the Company’s information security system building.

service-1

Elaboration of the Company’s information security Policy

We offer services on elaborating information security Policy, procedures and other regulatory and administrative documents on information security in accordance with the specific character of the Client’s IT infrastructure, peculiarities of internal business-processes and requirements to cyber protection. We provide the Client with a set of documents “Company’s information security Policy” including instructions, regulations, rules and functional responsibility which cover all aspects of the Company’s information activity.

service-2

Trainings, seminars and conferences

We arrange and deliver trainings, seminars and conferences on cyber security issues and cybercrime prevention in Ukraine and the CIS countries. Main topics and goals: business protection, computer system and network security, social engineering, protection against modern competitor intelligence and industrial spying, elaboration of the Company’s information security Policy. We also provide corporate trainings.