Cyber Security
Creation of the company’s IT security strategy
Preparation of the security policy and its implementation
Testing the procedures of the security policy
Documentation of the applied security policy
Designing, implementing and testing of firewall systems and VPN networks, IDS systems (intrusion detection) and anti-virus software
Centre for the off-site security backup copies and data replications from the Customer’s system within the Cloud