Fejléc

Information and network security

Managed Services

The range of tasks can vary from simple support to comprehensive, proactive operation or even SOC service. In all cases, they include vendor maintenance and troubleshooting, for which we provide expert resources – for both remote and on-site work – and device replacement. If required, we perform system configuration and modification within the agreed timeframe, and even provide dedicated back-up devices. SOC services are provided by our subsidiary, the internationally successful SOCWISE Ltd.

Regulation and compliance

Our Governance Risk Compliance (GRC) team supports our customers’ cybersecurity efforts through general IT/OT information security consulting, as well as the implementation and continuous maintenance of GRC platforms. This lets them comply with different applicable regulations and standards, develop regulated processes, and eliminate deficiencies identified during the performance of information security assessments.

Cyber defense consulting

All businesses, regardless of their size, must be prepared to fend off ever-evolving cyber attacks. For this reason, monitoring the IT infrastructure is becoming increasingly prominent. Cyber risk management enables organizations to detect cyber attacks as early as in the initial phase, and respond to them before they cause damage or disruption.

Network Integration

If a company’s business data, intellectual property, or customer data falls prey to competitors or cybercriminals, it poses a threat to the fundamental operations of the business. In addition, due to the hyper speed at which the field of technology changes or becomes obsolete, as well as the fact that attackers are constantly ahead of the curve, new defense concepts, methods, and systems are becoming quasi compulsory in reducing security risks to an acceptable level.

Cyberphysical system security

Our SOC organization is also prepared for processing and analyzing OT threats and attacks. In such cases, the incidents found in OT devices are processed in cooperation with the operators of the production area. Our analysts support and coordinate the IT and control technology experts who are inexperienced in this area.

Considering the needs of the given organization, we can also ensure the operation of the implemented systems in addition to level 2 and 3 support. We support our customers in developing appropriate procedures for investigating suspicious incidents and active preparation.

Cybersecurity systems

Our organization has two decades of experience in designing, implementing, and operating cybersecurity systems. We are market-leaders in on-prem SIEM solutions in Hungary, and we have also successfully completed several European projects. Our services include designing cybersecurity system architectures, developing SIEM systems, cybersecurity system integration, integrating MFA solutions, network sandbox technology, vulnerability management, XDR and SOAR solutions, as well as comprehensive operational support. Our advanced endpoint and detection tools offer outstanding protection for our customers.

Other solutions

Development

Datacenter solutions

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.