Asset Protection

More than 30 IDM realisations in the Czech Republic and abroad

AMI Praha Asset Protection
Automated Detection and Response

Automated Detection and Response

Automated Detection and Response (ADR) system for modern cyber threats

Effective investigation and analysis of security incidents

Endpoint Protection

Endpoint Protection

Endpoint/station protection against ransomware, malware, phishing, exploits and other threats

Endpoint protection doesn’t just include protection from malicious code, but covers a much broader area, including various types of data encryption, port protection, personal firewall, network access control, personal VPN, and Internet behaviour control.

Security Information and Event Management

Security Information and Event Management

SIEM (Security Information and Event Management) is the management of security information and events

Automatic real-time monitoring of the enterprise network security environment, identifying and remediating security incidents, and documenting compliance

Network Monitoring

Network Monitoring

Monitoring computer networks based on data flows

Tools using this technology greatly facilitate diagnostics, network performance optimization, identification and troubleshooting of operational issues, and other tasks