- Improvement and creation of security infrastructure of network
- Anti-virus, spams and malicious code services
- Design and implementation of ISMS based on ISO 27001
- Penetration and vulnerability tests
- IT infrastructure security evaluation
- Gap Analysis for ISO 27002
- Information and network security training
|
|