Security



SECURITY SOLUTIONS

DELIVERING DEPENDABLE DATA AND SYSTEM SECURITY PRODUCTS & SERVICES

  • INNOVATIVE SOLUTIONS
  • KNOWLEDGEABLE TEAM
  • SEAMLESS INTEGRATION
  • ADVANCED TECHNOLOGY

WHAT WE OFFER

From monitoring to compliance, we offer a wide array of security products & services to ensure the future of your business is safe and secure.

play

EKRAN

MONITOR, DETECT, AND ANALYZE INSIDER THREATS

Gain advanced, actionable insight into the activities of your users with ERKAN. Our monitoring system records all administrator actions, provides various means of accessing and viewing user sessions (e.g. remote desktop, SSH), and empowers supervisors to take quick action, with smart indexing and verified logs.

We provide a solution that is low-cost, yet high-impact; easy to deploy, yet even easier to integrate into an organization’s workflow. Getting setup and configured is straightforward and requires absolutely no changes in processes or procedures, making ERKAN a seamless, discreet tool that provides you with the comfort of knowing any and all threats will be stopped in their tracks.

LEARN MORE
play

ELISA

COLLECTING AND EVALUATING CYBERNETIC SECURITY EVENTS

Meeting the requirements and standards defined by cyber security laws and regulations, ELISA provides a cost-effective, easy-to-use LM/SIEM solution for collecting, correlating, and analyzing events occuring on IT systems, including repeated unsuccessful logins and propagation of malicious code.

With a flexible, easy-to-use web-based GUI and fast, efficient processing power, ELISA is able to scan and correlate events over a span of months and generate results that are clear, thorough, and exportable.

LEARN MORE

GDPR

COMPREHENSIVE ASSESSMENT & IMPLEMENTATION SERVICE

Valid from May 25th, 2018, the General Data Protection Regulation (GDPR) is an EU regulation that will strengthen citizens' rights by increasing the level of protection of their personal data. In collaboration with the law firm, PIERSTONE, we offer an extensive assessment of your company’s compliance with the GDPR and help you implement any necessary changes.

As part of this service, we perform a mapping of your personal data processing, conduct a differential analysis, and recommend the most appropriate way to manage your risks. In addition, we can conduct a full security study, looking at the compliance of your complete IT security management system or, if it’s not established yet, we provide you with the requisite knowledge and guidance according to ČSN ISO / IEC 27001: 2014.

References

  • „Our log management system provides us with a rich source of information.“
    Pavel Rous
    IT Manager
    Provided web proxy traffic statistics, IEEE 802.1x managed access evaluation, and ELISA Security Manager.
  • „ELISA has proven to work effectively in tandem with our NetFlow monitoring, extrapolating details of security events from our logs.“
    Luboš Pilař
    IT Manager
    Provided the integration of Lotus Domino infrastructure and applications, an audit of their MSSQL and MySQL databases, and the installation of ZABBIX operational monitoring.
  • „ELISA helps us meet the CNB's banking supervisory requirements.“
    Miroslav Rudolf
    IT Manager
    Provided an audit of their Oracle Database and Less Common File Server (NAS) and the integration of ZABBIX Operational Monitoring software.
  • Become also our other satisfied client.

Let’s connect

CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.