Security Information and Event Management / Providing an overview of the IT infrastructure

We offer a proven way how to ensure and manage security of information and integrate it into an organization's existing management system. The aim of ISMS is to actively manage the risks that arise for organizations from the use of information systems and technologies and from the dependence of processes on information. The system is based on ISO / IEC 27001 and ISO / IEC 27002 standards. Our company has ISMS certification and long-term practical experience, making us a trusted supplier of security management systems and thus having a competitive advantage over suppliers who do not have these certifications and practical experiences.

Monitoring and evaluation of ongoing events

It is an audit activity that monitors and evaluates the behaviour of users within their work with information systems, detects suspicious behaviour and other anomalies. Keep your users under control.

Protection against threats and attacks on IS

Better safe than sorry. In our portfolio, we have products that enable our customers to effectively minimize costs of the protection of information systems against advanced threats and attacks on IS. These systems enable, for example, to log events in IT systems, detect suspicious behaviour and generate relevant information about events that require special attention from the security perspective.


Česká národní banka

Czech National Bank

Our team carried out an implementation of an application for the communication of the Central Register of Accounts with the Data boxes information system. The project included requirements analysis, draft and implementation of a solution that now works to the contentment of the CNB. We provide the customer with support, maintenance and development services for the delivered solution.

Modrá pyramida

Modrá pyramida

The specialist in providing housing loans places high demands on IT and user security. Modrá pyramida has chosen our company as a partner for this area. We delivered a SIEM system to the customer. The provision of complete support, development and update of new versions of the delivered solution is part of the service as well as security consultations and advice on resolving security incidents.

Czech Point


We designed many agendas and services. Within this project, we implemented a unique system of user management known under the name JIP/KAAS (Unified Identity Space / Catalog of Authentication and Authorization Services). Thanks to the unambiguous authentication and authorization of every user we achieved non-repudiation responsibility of the user. The project Czech POINT has been successfully working for a lot of years!

Datové schrány

Data boxes

We created a unique system for state-guaranteed electronic communication between citizens, commercial companies and public authorities via a data box. It guarantees a high security level for users and transmitted data.

Contact us

We are specialists in IT processes, digitization, data protection and access management.