
WHAT WE DO
​
We’re continuously innovating to provide next-generation cybersecurity services that can protect your entire value chain, end-to-end.

Risk & Compliance
-
Gap Analysis
-
Risk Assessment
-
Consultancy for boards and Executives
-
ISO 27001 Preparation
-
Business continuity & cyber resilience
-
Strategy & Operating model development
-
Security policies (development and/or review)
-
GDPR (Compliance Services to meet the General Data Protection Regulation)
-
User awareness and training

​​ Cyber Security
​
-
Asset management review and process development
-
Vulnerability assessment – Penetration test
-
Systems secure configuration (tailored hardening process)
-
Email and browser protection (configuration settings, tools, and countermeasures)
-
Security testing / Assessment
-
Infrastructure: exercises, red/purple teaming
-
Web Application
-
Mobile Application
-
-
Threat Hunting (advanced malware detection and identification as an extra layer of EDR components, applied MITRE ATTACK framework)
Managed Security
​
-
Anti-malware implementation and operational support
-
Advanced Endpoint Detection and Response
-
Co-managed services
-
Customized reporting, tuning, and testing
-
Log monitoring support (Architectural review, deployment, and/or operational support - consulting)
-
Incident Handling (Plan, processes and playbooks development – operational support with EDR implementation – near real-time response)
