Contact us
For your convenience, use this form:
Send
Thank you!
Your email has been sent
Contacts
+40-79-047-00-46
en
ru
ua
de
I'm under attack!
Company
About us
What makes us different
Company management
History and mission
Values and Codes of Ethics
Sustainability
Certificates and competence
Our business cases and clients
Customer references
Career
Doing business with us
Contacts
News
Blog
Services
Security audit and testing
Penetration testing
Red Team – incident response assessment
Security compliance audit
Security audit of source code
Audit of smart contracts
Configuration audit and cloud security assessment
SCADA and ОТ audit
Incident investigation and forensics
Security implementation
Business Continuity Management as a service
Server hardening
DoS, DDoS, and TDoS protection
Implementation of cloud security
Protection of telecommunications
Security of SCADA and industrial IT/OT
Application security
Secure Software Life Cycle
Product, service and DevOps security
ASVS certification
Application security training
Security compliance
ISO 27001 implementation and certification
SOC 2 implementation and report
VDA ISA and ENX TISAX implementation
PCI DSS implementation
GDPR implementation and DPO service
ASVS certification
Application Development and DevOps
Software development
DevOps
Development of smart contracts
Virtualization
Security training
Awareness programmes
Application security training
Training for cybersecurity specialists
Industrial security training
Managed security
Managed compliance
Security experts as a service and Virtual CISO
Protection of websites
Managed threat detection and response
SOC as a Service
Threat intelligence
Solutions
Website Security Scanner
ISO 27001 audit online
VDA ISA and ENX TISAX audit online
SCADA/ICS audit calculator
SIEM/SOC implementation
SOC as a Service
Industries
Industrial
E-commerce
Automotive
Banks and financial sector
Medicine and pharmacy
Telecommunications
SaaS and product IT companies
Information security companies
Web3 and blockchain
Small and medium business
Enterprise
Tag: CIS
Home
/
CIS
Configuration audit and cloud security assessment
Read
Managed compliance
Read
ASVS certification
Read
Product, service and DevOps security
Read
Secure Software Life Cycle
Read
Implementation of cloud security
Read
Server hardening
Read
Security compliance audit
Read
This website, like any other well developed website, uses cookies.
Agree
Details