Information and Security Management

Implementation of an information security management system in accordance with relevant standards, consulting and auditor services.

Chief Information Security Officer Services

Thanks to the external assurance of the position of Chief Information Security Officer, the issue of IS security solutions is more accessible.

eDiscovery a Digital Forensic Analysis

In the event of an imminent or past security incident, it is necessary to analyze its extent and causes.

Forensic Report

Elaboration of a forensic report in the field of information and communication technologies and information security.

Sales and rental of SW and HW for forensic analysis and eDiscovery

Sale or rental of specialized HW and SW for forensic data security and their subsequent analysis and reporting..

Data Recovery

Data recovery from damaged storage devices - hard drives, USB flash drives, memory cards or phones..

Training

We offer a wide range of training in the field of IT security for professionals in organizations and ordinary employees.

For Companies

Security of Information Management

Implementation of an information security management system in accordance with relevant standards, consulting and auditor services.

CISO Services

Thanks to the external assurance of the position of Chief Information Security Officer, the IS security solution is more accessible.

eDiscovery and Forensic Analysis

In the event of an imminent or past security incident, it is necessary to analyze its extent and causes.

Forensic Report

Elaboration of a forensic report in the field of information and communication technologies and information security.

Sale and Rental of HW and SW

Sale or rental of specialized HW and SW for forensic data security and their subsequent analysis and reporting.

Data Recovery

Data recovery from damaged storage devices - hard drives, USB flash drives, memory cards or phones.

Secure Data Erasing

Reliable erasing of data from storage media comes in handy especially when selling a disk or a computer.

Training

We offer a wide range of training in the field of IT security for professionals in organizations and ordinary employees.

For Individuals

Forensic Report

Elaboration of a forensic report in the field of information and communication technologies and information security.

Data Recovery

Data recovery from damaged storage devices - hard drives, USB flash drives, memory cards or phones.

Secure Data Erasing

Reliable erasing of data from storage media comes in handy especially when selling a disk or a computer.

~

Computer and Telephone Security

We will help you with the appropriate settings for the security of your data in accordance with individual risks.

From our Blog (Czech)

Let's get to it

Let us know what we can help you with

Belgická 19, 120 00 Prague 2

+420 315 55 88 70