Security assessment services
− Vulnerability and current threat monitoring of IT infrastructure
− IT asset management and change monitoring
− Continuous work of experts in risk analysis and modeling
− Consulting on building the SSDLC process
− Implementation of security criteria and the SSDLC process
− Supporting the existing secure development process
− Virtual CISOAnalysis of employee behavior and evaluation of their potential resistance to attacks using social engineering methods: