• Improvement and creation of security infrastructure of network

 

  • Anti-virus, spams and malicious code services

 

  • Design and implementation of ISMS based on ISO 27001

 

  • Penetration and vulnerability tests

 

  • IT infrastructure security evaluation

 

  • Gap Analysis for ISO 27002

 

  • Disaster recovery

 

  • Information and network security training