Information and Security Management

Implementation of an information security management system in accordance with relevant standards, consulting and auditor services.

Chief Information Security Officer Services

Thanks to the external assurance of the position of Chief Information Security Officer, the issue of IS security solutions is more accessible.

eDiscovery a Digital Forensic Analysis

In the event of an imminent or past security incident, it is necessary to analyze its extent and causes.

Forensic Report

Elaboration of a forensic report in the field of information and communication technologies and information security.

Sales and rental of SW and HW for forensic analysis and eDiscovery

Sale or rental of specialized HW and SW for forensic data security and their subsequent analysis and reporting..

Data Recovery

Data recovery from damaged storage devices - hard drives, USB flash drives, memory cards or phones..

Training

We offer a wide range of training in the field of IT security for professionals in organizations and ordinary employees.

For Companies

Security of Information Management

Implementation of an information security management system in accordance with relevant standards, consulting and auditor services.

CISO Services

Thanks to the external assurance of the position of Chief Information Security Officer, the IS security solution is more accessible.

eDiscovery and Forensic Analysis

In the event of an imminent or past security incident, it is necessary to analyze its extent and causes.

Forensic Report

Elaboration of a forensic report in the field of information and communication technologies and information security.

Sale and Rental of HW and SW

Sale or rental of specialized HW and SW for forensic data security and their subsequent analysis and reporting.

Data Recovery

Data recovery from damaged storage devices - hard drives, USB flash drives, memory cards or phones.

Secure Data Erasing

Reliable erasing of data from storage media comes in handy especially when selling a disk or a computer.

Training

We offer a wide range of training in the field of IT security for professionals in organizations and ordinary employees.

For Individuals

Forensic Report

Elaboration of a forensic report in the field of information and communication technologies and information security.

Data Recovery

Data recovery from damaged storage devices - hard drives, USB flash drives, memory cards or phones.

Secure Data Erasing

Reliable erasing of data from storage media comes in handy especially when selling a disk or a computer.

~

Computer and Telephone Security

We will help you with the appropriate settings for the security of your data in accordance with individual risks.

From our Blog (Czech)

Spolehlivé mazání dat

Spolehlivé mazání dat

Asi každý někdy mazal data – ať omylem, nebo úmyslně. Data se ve většině případů přesunou do koše, kde nejsou plně smazaná. Ovšem ani po odstranění z koše nepřestávají data existovat – nechají stopu na disku, odkud mohou být určitými nástroji obnovena. Jedině metody...

Phishing

Phishing

Podvody jsou praktikovány ve společnosti po staletí. S nástupem internetu jako hlavního komunikačního média logicky podvody obsadily i digitální prostředí. Jednou z nejčastějších forem internetových léček je phishing, kde za pomoci falešných stránek a výzev se z vás...

Let's get to it

Let us know what we can help you with

Belgická 19, 120 00 Prague 2

+420 315 55 88 70