Our solutions are in accordance with the legislation of eIDAS, GDPR, Act on Cyber Security and others.

Threat and Vulnerability Assessments

It is an audit activity that monitors and evaluates the behaviour of users in their work with information systems, detects suspicious behaviour and other anomalies. Based on this analysis, it is possible to evaluate and minimize certain security threats in a timely manner. Furthermore, based on this analysis, it is possible to determine the use of IT resources and licenses and thus optimize the hardware and software acquisition and support their effective use.

Support and implementation of security projects / design and implementation of security policies

We can prepare a security project for our customers, including a security policy and related documentation, such as the Access Control Policy, Information Exchange Policy, the Privacy Policy, etc.

Security documentation

According to the customer's requirements, we are able to compose security documentation that will reflect the security policy of the customer's information system. We can also compose security documentation in accordance with the Regulation on Cyber ​​Security and Personal Data Protection.

References

Česká národní banka

Czech National Bank

Our team carried out an implementation of an application for the communication of the Central Register of Accounts with the Data boxes information system. The project included requirements analysis, draft and implementation of a solution that now works to the contentment of the CNB. We provide the customer with support, maintenance and development services for the delivered solution.

Modrá pyramida

Modrá pyramida

The specialist in providing housing loans places high demands on IT and user security. Modrá pyramida has chosen our company as a partner for this area. We delivered a SIEM system to the customer. The provision of complete support, development and update of new versions of the delivered solution is part of the service as well as security consultations and advice on resolving security incidents.

Czech Point

Czech POINT

We designed many agendas and services. Within this project, we implemented a unique system of user management known under the name JIP/KAAS (Unified Identity Space / Catalog of Authentication and Authorization Services). Thanks to the unambiguous authentication and authorization of every user we achieved non-repudiation responsibility of the user. The project Czech POINT has been successfully working for a lot of years!

Datové schrány

Data boxes

We created a unique system for state-guaranteed electronic communication between citizens, commercial companies and public authorities via a data box. It guarantees a high security level for users and transmitted data.

Contact us

We are specialists in IT processes, digitization, data protection and access management.