WE COVER THE ENTIRE SPECTRUM OF
INFORMATION
SECURITY SERVICES

ASSURANCE | SECURITY MANAGEMENT |
SECURITY TRAINING

Our expertise lies in:
• Penetration testing
• Vulnerability assessment
• ISMS development
• Application architecture review
• Whitebox web application security assessment
• Risk assessment
• Security studies

Get a quote

assurance

ASSURANCE SERVICES

Is your business secure?

Our team will investigate the effectiveness of your safety measures and report on vulnerabilities found in web or mobile app, as well as your systems and networks.
Web / Desktop / Mobile Applications

  • Application Source Code Review
  • OWASP ASVS Certification
  • OWASP OpenSΑΜΜ Certification
  • Security Plan / Requirements Development
  • Application Penetration Test

IT Infrastructure

  • System Penetration Testing
  • VoIP, WiFi Penetration Testing
  • Vulnerability Assessment
  • Honeypots

OT Infrastructure

  • Server OS Assessment
  • Control Applications Assessment
  • PLC / RTU Assessment

IoT

  • OS Hardening
  • OS Security Review
  • Architecture Review
isms

SECURITY MANAGEMENT

Have you got the right security procedures in place?

Our team builds from the ground up a set of security procedures and processes customised to your company’s needs, while educating your employees on how to implement and maintain them.

  • Risk Assessment
  • Business Impact Assessment
  • Data Classification
  • GDPR Consulting (EU General Data Protection Regulation 2016/679)
  • Gap Analysis (against ISO27001, PCI-DSS, best practices)
  • QMS / HR Security Hooks Implementation
  • ISMS Development and Implementation
  • Preparation and pre-assessment for: ISO27001, PCI-DSS, PCI-PA DSS
compliance

SECURITY TRAINING

Do your employees implement the security policy?

We offer Security Training Sessions and Workshops tailored to your needs, providing your team with the necessary resources to efficiently cope with the Cyber threats you may face.

  • Secure Software Design / Development
  • Digital Forensics Training / Workshop
  • ISMS Implementation
  • Live Hacking Awareness
  • Security for IT
  • Security for Everybody
  • Service Management System Implementation
  • Penetration Testing Web Applications
  • Penetration Testing Mobile Applications
  • Penetration Testing IT Systems