Get to know us!
Introduction
More than data and device protection
Services
Our mission
Complex protection, multidimensional thinking
Our mission is to effectively support our customers to securely operate their IT assets and systems with our market-leading products and services. The unique advantage of our company compared to other market players lies in its ability to help our customers creating security not only in the IT field, but also in the physical environment.
Thanks to our experience in law enforcement, we know to the fact that complex protection requires multidimensional scope and approach. In addition, an experienced legal team supports our activities, in order to carry out our activities in accordance with the current legal environment.
Information security
Strict protection protocol
Our products and services are fully compliant with applicable international and hungarian legislation aimed at protecting private and corporate data and property. Our IT experts have years of experience in the IT sector and they are fully capable to seize the power and effectiveness of our softwares in it security.
As a result, we have developed a strict protection protocol that guarantees high level of security and beside that aides the avoidance of data breaches.
Vulnerability assessment
Data protection on the highest level
We perform deep and comprehensive vulnerability assessments on servers, endpoints, web applications and websites, wireless networks, network and mobile devices.
Based on these tests, we evaluate the IT infrastructure and provide detailed recommendations on how to fix vulnerabilities that threaten the security of the examined devices and systems.
Vulnerability assessment
Black box
During the vulnerability test, we do not use information from the operator. We simulate the activity of an external, malicious attacker. The test shows the dangers of the possible targeted data leakage activities of hackers with professional knowledge.
Gray box
We operate with user-level privileges provided by the client to perform our evaluation. We reveal the possibilities of illegal data leakage activities by an internal employee.
White box
The vulnerability test is carried out on the basis of the detailed system description provided by the client. It is realized with full access to the system to reveal the risks inherent in the structure of the network and the programs running on it.
We have outstanding professional knowledge - even unique in several areas - of the IT sector, that allows our clients to receive the best personalized services after consultation.