Services
- We are defining and revising your security architectures - protect - detect - react
- We are analyzing potential risks (penetration tests)
- We are supporting you during IT audits
- We are doing incident response (intrusions, misuse, theft)
- We are carrying out legislation compliant and scientifically based forensic investigations
- We are monitoring publicly available information via open source monitoring
- We are monitoring and analyzing your log files