This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Asset Protection
More than 30 IDM realisations in the Czech Republic and abroad
Automated Detection and Response
Automated Detection and Response (ADR) system for modern cyber threats
Effective investigation and analysis of security incidents
Endpoint Protection
Endpoint/station protection against ransomware, malware, phishing, exploits and other threats
Endpoint protection doesn’t just include protection from malicious code, but covers a much broader area, including various types of data encryption, port protection, personal firewall, network access control, personal VPN, and Internet behaviour control.
Security Information and Event Management
SIEM (Security Information and Event Management) is the management of security information and events
Automatic real-time monitoring of the enterprise network security environment, identifying and remediating security incidents, and documenting compliance
Network Monitoring
Monitoring computer networks based on data flows
Tools using this technology greatly facilitate diagnostics, network performance optimization, identification and troubleshooting of operational issues, and other tasks