Services

Audit

Penetration Testing

Traditional IT securitiy assesments, these come in various flavours: intrusive, blackbox, recognition, social engineering, physical access and target specific We provide a tailor-made approach to each client as the critical part of IT infrastructure are different on each business Our reports are made to be useful and realistic in prioritising your business need first, there is always a way to balance security and operations, just need to be aware of the missing ingredients.

Frameworks

SOX, JSOX, PCI-DSS, BS 7799, ISO/EIC 270xx, ITIL v3 Yes, is all about acronyms, strange enought, most of them are well known and respected in many industries. Hence, we do follow them and understand the wording and interpretation that each refer to.

Practical Security

Consolidation

Key element, cost vs security. Ten years ago was all about the bigger datacenter, huge hardware and tons of devices laying around. IT world evolve and so the business need to adapt to it, for this, these days the right approach is not related to amount of stuff. We need to be as much efficient it could possible be, the first approach was the server layer and everyone is fully aware of the benefits it bring (direct impact on ROI) What about our lovely network & security layer? Yes, is possible to maintain a secure consolidate enviroment at a lower cost without lossing efficiency.