First, we carry out a detailed audit of your system. We need to understand what and from what threats must be protected, which standards to use, how to fulfil them in the most effective (cheap or quickly) manner, what hardware can be reused, which network segments do not represent critical value, and which, on the contrary, should stand at any cost.
The result of the audit is an action plan that includes both organisational measures such as updating the job descriptions of the employees, and directly technical measures. Then you choose the schedule of implementation: sometimes something can be done here and now, and sometimes additional purchases of equipment are required. At the end, you accept the work.
Naturally, each stage has its own nuances, so it is better to ask our expert the questions that arise immediately.
In terms of security, it is especially important, because often the temptation to redo everything from scratch or buy ‘this expensive hardware that will solve all the problems’ turns out to be stronger than the desire to think over and understand the case. Therefore, we are the ones who specialise in this.
Yes, we have a test bench with a deployed DLP-system, and we can simulate a small pilot intrusion, so you can really see how it works.
The ‘Software’ section contains a description of the protection measures. Sure, our work consists not only in the implementation of all this stuff, but in the organisation of the process in a way, that everything will work many years later. And will not be perceived as something unnecessary, but required according to the standard.
Yes, we perform small pilot implementation projects. In the field of information security, it is one of the few efficient ways to show expertise of the employees and approach of the integrator. In the majority of cases, our pilot implementation projects after evaluation are put into operation and expanded to the entire company.