Since 2011, we have been designing and building information networks and computer systems and implementing information security solutions
We specialize in providing services in the field of cybersecurity, corporate networks and data management such as:
- Risk Based Vulnerability Management (RBVM)
- Penetration Testing
- Security Assessment
- Code Analysis
- Data Masking
- Network Design
We also have a Technical Support Services (TSS) team at various levels.
OUR COMPETENCIES AND VENDORS
Comprehensive cybersecurity solutions (CyberSec):
Vendors: CrowdStrike, ESET, Trellix, Cisco, Fortinet, Tenable, F5, Forcepoint, Delinea, Splunk, Picus;
Areas:
1. Endpoint protection (EPP, EDR): ESET, Trellix, CrowdStrike, Cisco, Fortinet
2. Vulnerability management IT/OT/WEB: Tenable
3. Protection of services: - Identity protection: Tenable, CrowdStrike - Web Application Firewall: F5, Fortinet - Mail Security Gateway: Fortinet, Cisco, Trellix - MFA: Cisco, ESET, Fortinet
4. Data Loss Prevention (DLP): Trellix, Forcepoint, ESET
5. Control of privileged users (PAM): Delinea
6. Cloud access security broker (CASB): Trellix, Forcepoint
7. Log collection and analysis, incident management (SIEM/SOAR/UEBA): Splunk
8. Proactive security, attack simulation (BAS): Picus
9. Cloud protection (CNAPP/CSPM/CIEM/CWPP/KSPM/IaC/Cloud Detection and Response): Tenable, CrowdStrike
10. Services: Risk-based Vulnerability Management (RBVM), Security Control Validation (SCV), TSS
Networking
Vendors: Cisco, Aruba, Fortinet, Juniper;
Areas:
1. Corporate networks (LAN/Wi-Fi/WAN, SD-WAN, SD-LAN, Enterprise Management & Monitoring)
2. Data center networks (DC Classic, SD-DC, DC Management & Monitoring)
3. Network security (NGFW, NAC, NTA, SWG, SSE, DDoS Protection, Security Management & Monitoring)
Computing
Vendors: NetApp, IBM, HPE, DellEMC, VMware, Commvault;
Areas:
1. Virtualization and Clouds (Computing Virtualization (DC), Storage Virtualization (DC), Network Virtualization (DC), Workplaces and Applications Virtualization (Remote work), Hybrid Cloud Platform, Virtualization Management and Automation, Cloud services based on Hyperscalers and СP, Cloud Management and Automation, Container Solutions)
2. Infrastructure components (Server for high-performance tasks, Server for productive tasks, virtual infrastructure, Entry-Level Server, High-performance Storage, Object Storage, File Storage, Entry-Level Storage, SAN)
3. Ensuring reliability (Disaster Recovery, Backup and Restore)
4. Application level (OS, Office SW, Databases)
Data control (Data Management)
Vendors: Delphix, IBM VDP, DataSunrise, Micro Focus, OpenText;
Areas:
1. Database management (Virtualization of databases and applications, control and audit of access to the database)
2. Data management and security (Data masking, Data encryption)
3. Software security (Checking source code and software for SAST, DAST, RAST vulnerabilities)
Penetration testing for IT infrastructures
Security analysis of source code and software components
Breach Attack Simulation / Security Control Validation service
Data masking for different databases
Technical support services for IT infrastructures
We form an experienced team to work on your project. Qualified pre-sales, implementation, and support engineers will work on each implementation.
We have practical experience and deep expertise. Our team is an expert in implementing comprehensive security solutions and supporting complex integrated solutions using current innovations and proven practices.
We use leading tools and have a high level of expertise in their effective use. We select the best tools among the best solutions in our industry for the specific needs of the client.
We successfully and effectively cooperate with vendor specialists. Close interaction with experts from technology companies allows us to develop and implement optimal and most efficient solutions for our customers.
We apply an integrated approach to the development, implementation and support. As a result, we create fully personalized solutions that are optimally customized to the specific needs of the client and help to achieve maximum efficiency in solving customer problems and obtaining the necessary business results.
We have our own technical support service.
We apply cross-technology and multi-vendor expertise. This approach allows us to work as thoroughly and efficiently as possible to improve our clients' information security.