Cybersecurity

We have many years of experience in implementing cybersecurity projects in both the public and enterprise sectors. Our team of engineers, consultants and auditors have been handling consulting, audit, analytical and implementation projects.

cyber cyber

Our scope of services includes:

  • Implementation of technologies and services
  • IT security
  • Advisory services

More and more business activities take place in cyberspace. New technologies offer plenty of opportunity, but also impose responsibilities on firms to secure their information resources. We help clients identify potential dangers, we propose favorable solutions and we assist in their implementation.

Albert Borowski

Director of Cybersecurity

Our engineers have extensive experience in designing and implementing crucial and complex solutions on location for our clients. They act as trusted advisors. They possess the highest technical and analytical skills to secure high quality technical support for our clients.

We realize that the quality of services we offer is closely tied to the quality of our team. That’s why we invest in top knowledge and top solutions from our technology partners to secure specialist knowledge and professional project management for our clients.

Thanks to close cooperation with our technology partners, our clients have access to the advanced and proven cybersecurity solutions available on the market.

Our engineers have extensive experience in designing and implementing crucial and complex solutions on location for our clients. They act as trusted advisors. They possess the highest technical and analytical skills to secure high quality technical support for our clients.

We realize that the quality of services we offer is closely tied to the quality of our team. That’s why we invest in top knowledge and top solutions from our technology partners to secure specialist knowledge and professional project management for our clients.

Thanks to close cooperation with our technology partners, our clients have access to the advanced and proven cybersecurity solutions available on the market.

Technology implementation and services

We have a broad range of tools to monitor IT services and protect against cyber attacks. Our Security Operations Centers (SOC) are central IT units whose implementation increases the security of information assets of enterprises and their clients.

We specialize in comprehensive implementation of technologies and systems for security information and event management SIEM and Log Management (HP ArcSight, IBM Qradar, Splunk, McAfee SIEM, Elasticsearch, GreyLog, RSA). We conduct projects comprehensively, supervising from launch and functionality adjustment through technical and warranty support after completion. We also handle optimization, development and adaptation to changing customer needs on existing systems.

We offer SOAR systems. Implementation is preceded by an analysis of client needs with advisory services in security monitoring beginning from monitoring policies and running through procedures which we implement in SOAR-class systems.

  • A team of IT security experts using dedicated advanced tools to detect, analyze, react, report and prevent security incidents in our clients’ IT networks. SOC is based both on technology and properly defined processes and procedures. The main tasks of SOC include increasing the protection of data and critical assets, reacting to crisis situations in cyberspace, securing business continuity and recovery after an incident, and strengthening an organization’s infrastructure.
  • Use our Operational Security Center to ensure the security of your most valuable assets and the operational continuity of your organization. We can advise how to effectively model and implement processes for monitoring and responding to security incidents, how to manage vulnerabilities and manage the policies implemented by SOC teams.
  • Can’t find qualified IT security experts?
  • IT personnel outsourcing of staff involved in implementing the monitoring and incident response processes, in particular SOC operators and security analysts, will solve your problem.

Security Awareness Training involves educating employees about cyberspace security, various information security threats and the policies and procedures that a company uses to eliminate them. Over 90% of cyber-attacks target users! Therefore, well-trained employees play a vital role in protecting any organization. Technologies that detect and block threats cannot stop all attacks. That’s why your employees need the appropriate knowledge and skills to take action on phishing emails or fake business correspondence.

We implement Web Application Firewall (WAF) and Database Activity Monitoring (DAM) systems. We support clients in analyzing monitoring points as well as interpreting system performance results.

We implement Operational technology systems (OT) in the field of industrial network security. The solutions protect industrial and critical infrastructure against cyber threats, malicious insiders and human errors from the level of threat detection and mitigation to asset tracking, vulnerability management and configuration control.

We provide complete implementation of anti-malware systems (anti APT) and configure all appropriate modules extending their functionality. We also support our clients by adapting systems to their needs and by analyzing the malware detected by the system.

We offer comprehensive support services for IT security systems in accordance with the agreed service level agreement (SLA). In addition to standard technical support, our clients receive support and advice in the field of security. We additionally develop and optimize systems currently in use by our clients.

Expert knowledge in the field of monitoring highly privileged sessions and a wide portfolio of products enable us to recommend and implement a solution tailored to fit client needs to the highest degree.

IT security

Analysis of the IT security systems functioning in a company is a core preventive action. On the basis of our audits, we provide clients with information on vulnerabilities discovered in the systems we’ve reviewed and the areas for potential improvement along with recommendations.

We conduct the full scale of comprehensive security system coverage, including implementation, maintenance and optimization. We analyze the client’s IT environment on location to assess the fullness of security mechanisms and systems and make actionable recommendations. We perform information security and IT system risk analyses based on recommended norms, including ISO / IEC.

We perform an array of penetration tests as a security audit of web and mobile applications, Web Services / API services, infrastructure security, and WIFI network security. We use a variety of security test methodologies, including automated and manual audits as well as black-box, gray-box and white-box audits. We additionally specialize in social engineering tests and Red Teaming.

We conduct organizational audits of security and IT, verifying current practices and issuing technological and organizational recommendations. We further support our clients with architecture audits, in which inter alia we assess the completeness of the security mechanisms in use. Our audits meet KSC requirements and prepare clients for implementation of information security management systems (ISO27001).

Security policy optimization services include both analysis and recommendations. We also support clients in implementing the recommended improvements.

Services include analysis of security configurations of operating systems, application servers, databases and devices. We base our audit methods on STIG and other recommendations as well as the experience of auditors.

We also audit and analyze application codes at the request of clients in order to identify vulnerabilities and propose improvements. We use characteristic audit methodologies for our testing with particular emphasis on the OWASP Code Review Guide and requirements of other common standards.

We perform an array of penetration tests as a security audit of web and mobile applications, Web Services / API services, infrastructure security, and WIFI network security. We use a variety of security test methodologies, including automated and manual audits as well as black-box, gray-box and white-box audits. We additionally specialize in social engineering tests and Red Teaming.

We conduct organizational audits of security and IT, verifying current practices and issuing technological and organizational recommendations. We further support our clients with architecture audits, in which inter alia we assess the completeness of the security mechanisms in use. Our audits meet KSC requirements and prepare clients for implementation of information security management systems (ISO27001).

Security policy optimization services include both analysis and recommendations. We also support clients in implementing the recommended improvements.

Services include analysis of security configurations of operating systems, application servers, databases and devices. We base our audit methods on STIG and other recommendations as well as the experience of auditors.

We also audit and analyze application codes at the request of clients in order to identify vulnerabilities and propose improvements. We use characteristic audit methodologies for our testing with particular emphasis on the OWASP Code Review Guide and requirements of other common standards.

Consulting services

Our clients can count on the vast expert knowledge of our staff based on many years of experience in running and implementing solutions in cybersecurity.

We have portfolio of numerous IT security systems that we integrate to ensure the highest level of operational security for our clients. We utilize SIEM-class systems which we integrate with individual domain systems to optimize activities in this area.

We conduct numerous unique training courses related to information security. We conduct both product training stemming from implemented solutions as well as general training on IT security.

  • Security systems
  • IT systems
  • Security system integration
  • Security training
  • ISO 27001
  • PCI DSS

Our Partners

Questions concerning our offer?  Interested in doing business with us? Please make contact:   oferta_cb@comp.com.pl

Ta strona używa cookies. Korzystając ze strony wyrażasz zgodę na używanie cookies zgodnie z aktualnymi ustawieniami twojej przeglądarki. Dowiedz się więcej

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close