top of page

WHAT WE DO

We’re continuously innovating to provide next-generation cybersecurity services that can protect your entire value chain, end-to-end.

Capture33.PNG

    Risk & Compliance

 

 

  • Gap Analysis

  • Risk Assessment

  • Consultancy for boards and Executives

  • ISO 27001 Preparation

  • Business continuity & cyber resilience

  • Strategy & Operating model development

  • Governance, risk & compliance

  • Security policies (development and/or review)

  • GDPR (Compliance Services to meet the General Data Protection Regulation)

  • User awareness and training

 

 

Capture36.PNG

​​  Cyber Security

  • Asset management review and process development

  • Vulnerability assessment – Penetration test

  • Systems secure configuration (tailored hardening process)

  • Email and browser protection (configuration settings, tools, and countermeasures)

  • Security testing / Assessment

    • Infrastructure: exercises, red/purple teaming

    • Web Application

    • Mobile Application

  • Threat Hunting (advanced malware detection and identification as an extra layer of EDR components, applied MITRE ATTACK framework)

 

 

Managed Security

  • Anti-malware implementation and operational support

  • Advanced Endpoint Detection and Response

  • Co-managed services

  • Customized reporting, tuning, and testing

  • Log monitoring support (Architectural review, deployment, and/or operational support - consulting)

  •  Incident Handling (Plan, processes and playbooks development – operational support with EDR implementation – near real-time response)

 

 

Capture35.PNG
bottom of page