Setting up data and network security
Audit, development, and implementation of turnkey security projects based on the ISO 27001 protocol.
Perimeter protection and DMZ building from Fortinet, Cisco, Checkpoint.
Setting up backup and restore policy.
Network security setting up with dynamic segmentation technology from ArubaOS and providing controlled connectivity with Aruba ClearPass.
Assistance in the implementation of information security processes.
AUTOMATED SECURITY MONITORING
Monitoring of the state of information security objects and building SOC. Control over end devices using End-Point solutions.
The company's experience in this area
is confirmed by the following statuses:
Maturity Levels of Enterprise Information Security
Processes are implemented ad hoc and without any methodology
There are a certain number of non-standardized processes
Processes are documented and communicated to stakeholders
Quantitatively managed level
Processes are objects of monitoring and measurement