Image6

WE PROVIDE SECURITY

FOR YOUR BUSINESS SUCCESS


Increase the competitiveness of your organisation by strengthening your ICT security and data privacy level of your electronic services, respecting the regulations and standards and thus offering you competitive advantages in the area of trustful e-business


MORE
Image5

WE PROVIDE SECURITY

WITH INNOVATION


ICT PROTECT team members actively participate in international forums, workshops and conferences in order to be continuously informed with the current information security trends


MORE
Image7

WE PROVIDE SECURITY

WITH TAILOR MADE SOLUTIONS


ICT PROTECT specialists will find the best solution for your company in order to address your specific needs


MORE
Image8

COMPLIANCE


Be compliant with the regulation, standards, rules and your business requirements.

START NOW
Image4

INFORMATION SECURITY


Identify your threats and vulnerabilities and find the best solution to mitigate your risks.

START NOW

ISMS IMPLEMENTATION

Information Security Management System (ISMS) Implementation

  • Design and implementation of all the mandatory ISMS policies (according to the ISO 27001 Standard)
  • Design and implementation of all the mandatory ISMS procedures (according to the ISO 27001 Standard)
  • ISMS training
  • Internal Audit

SMS IMPLEMENTATION

SERVICE MANAGEMENT SYSTEM (SMS) IMPLEMENTATION

  • Design and implementation of all the SMS mandatory policies (according to the ISO 20000 Standard)
  • Design and implementation of all the SMS mandatory procedures (according to the ISO 20000 Standard)
  • SMS training
  • Internal Audit

RISK ASSESSMENT

  • Identify the criticality of your ICT systems
  • Identify and evaluate your Threats
  • Identify and evaluate your Vulnerabilities
  • Identify and evaluate your Business Risks
  • Propose solutions in order to mitigate the Risks

VULNERABILITY ASSESSMENT

  • Web Application Penetration Test
  • Mobile Application Penetration Test
  • System and Network Penetration Test

RISK ASSESSMENT WITH STORM

You are able to conduct the Risk Assessment for all your ICT assets, View Results, Download Results in PDF and EXCEL format and Download Risk Assessment Report

SHARE
STORM Version 3.0: STORM has been updated in order to offer GDPR compliance services
STORM Version 2.0: The new version of STORM complies with the ISO 27001:2013 requirements
ISO 27001:2013: New version of the ISO 27001 standard published on October 2013.