We provide engineering services related to:
- to specification
- design,
- configuration,
- integration with ICS systems,
- testing,
- and implementation of software and hardware components related to Cybersecurity.
Image
Security server infrastructure hosting virtual machines dedicated to security services:
- AV system
- Patch Management and Deployment
- Backup and Recovery
- Active Directory / Global Policy Objects
- Network Intrusion Detection System
- Security Log Collector
- Remote Access / Jump host
Jump Server infrastructure hosting services deployed in DMZ:
- VPN solutions with multi-factor authentication
- Jump station for Remote Access
- Firewall
Security Network Design
- Physical network design
- Network cubicles design
- Logical network design in L2/L3
- Network devices configuration – L2/L3 switches, Routers, Firewalls
Network Intrusion Detection System NIDS
- Probes deployment
- Central Console Installation on Security Server
- Central Console Configuration
- Network baseline setup in various system operation conditions
- Elimination of False Positives
Backup and Recovery
- Concept development of Backup and Recovery system in the scope of:
- Stacji PC,
- Virtual Machines
- Network devices
- PLC>
- Agents installation and configuration on host
- B&R tool Configuration on base of defined policies
AV/EDR
- Agents installation and configuration on hosts
- Central Console Installation on Security Server
- Central Console Configuration
Patch management
- Agents installation and configuration on hosts
- Central Console Installation on Security Server
- Central Console Configurationh
Security Log Collector
- Development of the concept of collecting security logs
- Agents installation and configuration on Windows hosts
- Syslog configuration on Linux hosts
- Syslog/SNMP traps configuration on network devices
- Central Console Configuration
- SIEM interface configuration
Hardening configuration
- Host and Servers hardening
- Virtual Machine hardening
- Network devices Hardening
Mobile device sanitization systems
- Implementation of sanitation solutions in ICS systems
Vulnerabilities Test
- Performing vulnerabilities test in ICS
- Implementation of continuous vulnerability scanning systems
SOC
- Coordination in Integration of SOC in ICS
- SOC interface design