Cyber Security

  • Creation of the company’s IT security strategy

  • Preparation of the security policy and its implementation

  • Testing the procedures of the security policy

  • Documentation of the applied security policy

  • Designing, implementing and testing of firewall systems and VPN networks, IDS systems (intrusion detection) and anti-virus software

  • Centre for the off-site security backup copies and data replications from the Customer’s system within the Cloud