Services
When using information technology, various problems related to security but also operation can arise. Take advantage of the skills and experience of our staff.
Didn't find what you needed? Contact us.
Network security
We provide comprehensive network security solutions for your business. Protect your data and systems with our specialized services and expertise.
More infoPenetration testing
We provide professional penetration testing for vulnerability identification, attack prevention, data security and compliance. We increase security and trust.
More infoActive Directory
Server security and Active Directory. Migration and security of Active Directory domains. Connections to the cloud.
More infoAudit
We offer comprehensive information and cyber security audits, including ISO 27001, ISO 9001, GDPR, penetration testing and IT infrastructure, to ensure compliance with legislation and reduce risk.
More infoAuthentication
Correct identification of the information system user is crucial for access to the system. In order to prevent identity confusion or identity theft, it is necessary to verify the identity in advance, in other words, to authenticate the user.
More infoE-learning
We provide customized elearning solutions according to the customer's requirements, which ensure the process of training and education in various areas of information security.
More infoKolas Firewall Academy
We offer the opportunity to educate employees in the field of information security by raising the security awareness of employees or training for the use of selected security technologies.
More infoContent control
For solutions to control the content of communications to prevent information leakage, penetration of unwanted content or the use of unwanted applications, we provide identification of potential risks, design of a security policy and implementation of the solution.
More infoModern wireless networks
Delivery of state-of-the-art wireless networks with the possibility of complete replacement of fixed networks, including the implementation of security features for wireless networks (Wifi IDS), with the possibility of access of external mobile devices to your wireless network (tablets, smart phones, ...)
More infoMonitoring
Security monitoring is an essential detective measure that allows you to monitor what is happening on your network and helps you to effectively detect security incidents.
More infoPhishing
Test your employees to detect fraudulent and malicious emails. Nowadays, with the improvement of artificial intelligence and online translators, it is possible to create email text that is indistinguishable from regular speech or written language.
More infoPrivileged accounts
Privileged accounts pose a high risk of misuse as they have a large impact on the corporate environment. Therefore, these accounts need to be perfectly secured in terms of access management, passwords and monitoring of their use.
More infoProcess safety
The security architecture of any organisation is typically built on three pillars: people, technology and processes. The purpose of process security consulting services is to help build process security equivalent to technology measures.
More infoAccess control
We offer solution design and implementation, migration of the existing solution, security policy design, creation of operational documentation, security and technology audit, operation of the existing solution and operator training.
More infoRemote access
We offer solution design for remote access of mobile users, creation of policies and procedures for access allocation, implementation of IPSEC or SSL technology, integration with LDAP, AD and audit of the existing solution.
More info