Consulting
-
Equipment inventory
-
Peripheral inventory
-
Checking workstations
-
Checking of IT services provider
-
Implementation
-
Software inventory
-
Checking local area network
-
Server check
-
Recommendations
Safety
-
Penetration test
-
Check for spyware, backdoors, viruses
-
Безопасность используемых приложений
-
Protection recommendations
-
Checking IT for vulnerabilities
-
Identification of potential data loss safety
-
Software Application security
-
Implementation of security recommendations