Security

Processes

Cybernetic security

Introduction of an information security management process based on the value of the information assets of the company. The service focuses on analysing the information and data bases of the customer and the relation of the information to internal processes.

Analyses of risks, processes and informations

We offer consulting services with long experience and know-how. We provide analyses of risks, processes, ICT and information security, etc. We also introduce corporate ICT processes according to ITIL.

CSIRT

AXENTA CSIRT provides full scale of incident response services, from incident response coordination and digital forensics to mitigation of consequences of cyber attack. An important task of AXENTA CSIRT is also cooperation and information sharing within the domestic as well as international security community.

GDPR

We are able and ready to take all the necessary steps associated with the auditting of the current status, comparing with GDPR requirement, proposing the measures, changes and to define new processes to meet the requirements of the new european regulation on the personal data protection.

Training

Provision of individual training programs with focus on proper behaviour in the information system, effective work with collaborative applications (e-mail, calendar, appointments, tasks, directory structure, file system) and basic security aspects when working with the information system of the customer.

Monitoring

SOC

A comprehensive SOC solution ensures the detection and launching of security incident processes in the IT infrastructure.

Log Management & SIEM

Implementation of operational and security oversight, including log management. In operational oversight and log management, our activities are laid out in several parts and can be provided not only as a solution, but as a service as well (SaaS)

Privileged user access management (PIM/PAM)

Authorisation, authentication, and audit for administrator protocols. A transparent solution for the monitoring and access control of all activities of administrators, application administrators, users, outsourcing partners, external clients, etc.

Network behaviour anomaly (NBA)

Unique technology of network behaviour analysis which allows the identification of threats which overcame the security on the perimeter or were introduced into the network in a different way.

User behavioral analytics (UBA)

Blindspotter is a new generation IT security tool which analyses all user activity, including harmful events, occurring across all IT systems.

References

Finacial

ERSTE Group IT

ERSTE Group IT

  • Implementation of Log Management Syslog-NG PE system
  • Upgrade to a full Log Management – SSB system
  • Service and development of an SIEM security oversight system
ERSTE Group IT
Všeobecná úverová banka
DanubePay
Českomoravská stavební spořitelna
Moneta Money bank
Komerční banka
Allianz pojišťovna
PPF Banka
Česká průmyslová zdravotní pojišťovna
Disig

Utility

Orange

Orange

  • Audit system for privileged users – Shell Control Box
  • Implementation of HP ArcSight Logger
  • Installation of SIEM security oversight system (ArcSight)
Orange
O2 Czech Republic
Čepro
ČEZ ICT Services
Čeps
Řízení letového provozu
T-mobile Czech republic
T-systems Slovakia
Teplárny Brno

Public

Ministerstvo Obrany ČR

Ministerstvo Obrany ČR

  • Service and development of an SIEM security oversight system
Ministerstvo Obrany ČR
Ministerstvo pro místní rozvoj
Jihomoravský kraj
Armáda SR
Ministerstvo dopravy
Gooddata
Novartis
Tescalabs LTD