Products and Services
Product Menu
  • What We Do
  • Our Clients
  • About Us
  • Products and Services
  • Conference
  • Career
  • Contact
Products and Services
  • Anti-fraud
  • Risk analysis
  • IS audits
  • BCM
  • Cyber Defense Center
  • Data Loss Prevention
  • Endpoint Security
  • Firewall
  • GDPR
  • Hardening
  • ISMS
  • Document classification
  • Mobile Security Management
  • Outsourcing
  • Penetration tests
  • Sandbox
  • Secure development
  • Security Academy
  • SIEM
  • Social engineering
  • VMS
  • Web Application Firewall
AEC Data Security
  • What we do
    • Security Technologies
    • Risk & Compliance
    • Security Assessment
    • Cyber Defense Center
  • Our clients
    • Banks
    • Power and Utilities
    • Telecommunications
    • Industry
    • Commercial companies
    • Insurance
    • Public Sector
  • About us
    • Our Mission
    • History
    • Journals
    • Career
    • Code of Conduct
    • Partners
    • Aricoma Group
  • Conference
  • Career
  • Contact
CZ SK
Hledat
Search
Kód banneru

Products and Services

Building and ensuring the proper level of information security is a long-running issue. Processes connected to information security are necessary to understand in a broad context - not only technological, but also organizational, personal, and so on.

 
Page Content
  • Medigate
    Medigate combines knowledge of proprietary protocols, clinical workflows and extensive cy- bersecurity expertise, the aim of which is to provide accurate identification of connected de- vices, promotion of network-centric policies and operational efficiency.
  • Privileged Access Management
    We help you get your accounts under control.
  • Security Scorecard
    The SecurityScorecard is a platform that enables the evaluation of an organization's level of security on the Internet. It is provided as SaaS and offers continuous non-invasive monitoring of the company.
  • Cloud Security Assessment
    One of today‘s leading trends is the migration of corporate infrastructure to the cloud environment. However, the cloud environment brings new challenges and opportunities where existing tools and procedures are no longer effective.
  • Security monitoring
    The Cyber Defense Center monitors and resolves cyber security incidents in real time, seven days a week.
  • Advanced White-box
    The advanced white-box comprehensively examines the security of applications under development by simulating hacker attacks, making use of automated code analysis, manual code reviews and audits.
  • Network Security
    Network security is essential for the protection of client data and information, to secure shared data, ensure reliable network access and performance, as well as for protecting against cyber threats
  • Cloud Security
    Cloud Security refers to the broad range of principles, technologies, applications and control elements used to protect virtualized IP addresses, data, applications, services and the associated infrastructure of cloud systems.
  • Penetration testing the external infrastructure
    During penetration testing of the external infrastructure the focus is on revealing all available network services and components and enumerating them in detail.
  • Secure Code Review
    Source code analysis can detect hidden threats and potential vulnerabilities in the application that do not detect common penetration tests.
  • Penetration testing for Wi-Fi networks
    Penetration tests of Wi-Fi networks reveal weaknesses or configuration deficiencies that can be subsequently eliminated as recommended, which increases the wireless network's resilience to cyber attacks.
  • Penetration testing for web apps
    During web application security testing, our tasks mainly focus on manual activities supported by the results from automated tools.
  • Penetration testing the internal infrastructure
    During penetration testing of the internal infrastructure the focus is on revealing all available network services and components and enumerating them in detail.
  • Penetration testing for desktop apps
    For desktop applications, we go to the source code level with the help of decompilation, including its modifications. The goal is to identify risky points, sensitive data or other deficiencies in authorization or transfers between the client application and the server.
  • Penetration tests for mobile devices
    During penetration tests of mobile applications, we look for errors in the implementation and the devices themselves. We analyze possible risks and look for safe solutions for using mobile devices in the corporate environment.
  • Red Teaming
    Red Teaming goes far beyond normal penetration tests. Teams of experienced ethical hackers fight each other to simulate a real hacker attack, using the latest technology and sophisticated methods.
  • Crisis management
    Crisis management overcomes extraordinary situations such as economic turbulence, bad decisions or pandemics. The goal is always to recognize the coming crisis early and to launch framework pre-prepared rescue processes.
  • Endpoint Detection and Response
    EDR is designed to protect endpoints from malicious code and penetration by attackers. The difference between conventional anti-virus products lies in the logging of important activities on the endpoint and a wide range of incident resolution options.
  • Identity Management
    Identity management deals with the management of users, roles and permissions. It increases security, automates, streamlines and speeds up processes within the company, it also helps with preparation of audit controls.
  • AEC Security Academy
    Using short and simple videos, the employees will learn everything about information security, methods of information protection and prevention of information leakage.
  • Security Operations Center
    SOC provides centralisation of security incident management, minimises incident response time and impact on protected assets.
  • Governance, Risk & Compliance
    GRCs are systems that help organizations with streamlining all information security management activities, which has a positive impact on their ability to respond promptly to existing and emerging risks.
  • GDPR
    We offer a wide range of products and services that can help meet the main requirements of the European legislative standard. You do not have to deal with all measures using your own internal resources.
  • Social engineering
    Using sophisticated methods and tools, our experts will check the level of awareness of information security in your organization. Whether remotely electronically, over the phone or in person.
  • Information security training
    Our specialists can draw up a number of workshops about information security, tailored to your individual needs, that are suitable for regular users, IS administrators, as well as top management.
  • Web Application Firewall
    The web portals, new functions, lots of various applications are always changing and the number of vulnerabilities of web technologies are increasing constantly. The WAFs are the most up to date technologies that protect your systems even without a complicated development cycle.
  • Vulnerability Management
    Vulnerability management is a complete process involving the detection, analysis and evaluation of vulnerabilities, including their elimination. VMS is absolutely crucial for cyber security, and therefore every company should have it.
  • Penetration tests
    Penetration tests examine the level of the organization's information security and the ICT resistance to existing cyber threats by simulating a hacker's attack on the computer network, web, or mobile application.
  • Risk analysis
    The risk analysis serves to appraise the actual state of security and identify risks that the system faces. It represents an important resource of information for decision-making about security investments.
  • Security administrator outsourcing
    Don't you have the sufficient capacity for solving security issues on your own? We offer you the services of our experts, who are fully devoted to security. Our experts can effectively fulfill tasks according to your individual needs.
  • What we do
    • Security Technologies
    • Risk & Compliance
    • Security Assessment
    • Cyber Defense Center
  • Our clients
    • Banks
    • Power and Utilities
    • Telecommunications
    • Industry
    • Commercial companies
    • Insurance
    • Public Sector
  • About us
    • Our Mission
    • History
    • Journals
    • Career
    • Code of Conduct
    • Partners
    • Aricoma Group
  • Conference
  • Career
  • Contact
Aricoma Group
2023 © AEC • All rights reserved
Back to top