Analysis, hardening and vulnerability assessment infrastructure assets in the activities of Vulnerabilty Management.
Deploy, roll-out and configuration of systems and technologies for the securing of infrastructure, such as Firewall/VPN, Network Access Control, Vulnerabilty Scanners, Network Intrusion Prevention and Antivirus Management.
We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.
You can read the details below. By accepting, you agree to the updated privacy policy.