Services:
- solution of differentiated access to the information system depending on the importance of stored data
- assistance in detecting vulnerabilities and other activities related to addressing information system security issues
- risk analysis
- penetration tests
- data recovery
- staff training .... etc.