Cyber security

Ensuring compliance with ISO/IEC 27001, ZoKB (including NIS2), DORA for all following areas

Data and services represent critical assets for organizations, and we help our customers protect them.

Do you need help setting up prevention, implementing a solution, or simply making better use of data for business purposes?

We have a practical solution for you in every situation. We specialise in data protection (data storage, backup, DLP), perimeter security, infrastructure and endpoints protection (Firewall, JumpServers, PAM, xDR). We ensure business continuity (backup, protection against ransomware), provide operational monitoring, and implement a unique solution for protection against cyber-attacks through external suppliers.

We will provide you with comprehensive protection against known cyber threats, all in accordance with legislation and international standards.

Data protection

Data protection

Centralised protection of corporate data is crucial fordefending against ransomware attacks, particularly within the provided storage arrays. Automatic creation of application-consistent data copies ensures that data is always ready for recovery without any loss of integrity. Immutable protection of these copies provides security against modern threats such as malware and ransomware

Data encryption

Data encryption is necessary to protect sensitive information within the delivered data storage solutions. Compliance with NÚKIB recommendations in the field of cryptographic algorithms ensures a high level of security. Key management is important for efficient and secure management of encryption keys.

DLP

Data identification and classification are the basis for effective protection against data leakage. Protecting data against leakage includes not only technical measures, but also internal threat management and user behavior analysis.

Perimeter Protection & Infrastructure Protection

Firewalls

Next Generation Firewall (NGFW) provides advanced protection against cyber threats using hardware or virtual solutions. These firewalls offer proactive protection by identifying and blocking threats in real-time. Centralized management allows for easy administrationand configuration of firewalls from one place, increasing efficiency and reducing management costs.

Segmentation

Network segmentation is key to protecting against cyberattacks. By dividing the network into smaller, isolated segments, you limit the spread of potential threats such as ransomware. Segmentation increases the resilience and availability of the network environment by minimising the impact of attacks across the entire network. This approach also makes it easier to manage and monitor individual segments, increasing overall security.

Vulnerability/Patch Management

The detection of known vulnerabilities within the operated infrastructure is the basis for effective security risk management. Comprehensive control of all applications, including third-party software, enables organizations to have an overview of all used software solutions and their security status. Managing the implementation of updates and security patches (patch management) is key to keeping systems up-to-date and protected against new threats. This process significantly reduces security risks by eliminating known vulnerabilities.

Proactive Cyber Threat Detection and Response (xDR)

Complex monitoring and advanced detection of anomalies within infrastructure and endpoints are the basis for effective protection against cyber threats. The unification of monitoring and detection of threats across platforms allows organizations to have a centralized overview of the state of cybersecurity of the entire environment. Effective security event and incident management and response ensures that organizations can respond quickly and effectively to threats. Proactive protection against cyber threats includes not only detection and response, but also attack prevention.

Anti-malware protection

Malware protection is essential for the security of endpoints, servers and email systems (AntiSpam). This protection includes the detection and blocking of malicious software that could compromise the integrity and availability of systems. Effective anti-malware solutions provide multi-layered protection that includes both preventive and reactive measures and significantly reduces threats.

Identity Protection & Access Management

Multi-factor autentication (MFA)

Multi-factor authentication (MFA) is essential to ensure secure user login. This process involves using more than one method of verifying the user’s identity, which greatly increases the security of the login. Protecting information and systems from unauthorized access and misuse is key, as MFA reduces the risk of attackers gaining access to sensitive data using only stolen passwords. A significant reduction in the risks associated with the theft of user accounts or identities is achieved by requiring attackers to overcome multiple layers of security. MFA is a key element for securing user accounts and reducing the risk of attacks.

Privileged Account Management (PAM)

Privileged Access Management (PAM) is critical for control and auditing privileged users. This system ensures that only authorized users have access to sensitive information and systems, protecting the organization from unauthorized access and misuse. Activity tracking and report generation for audit purposes enables organizations to monitor and analyze the activities of privileged users, which is key to identifying and preventing potential threats. Minimizing risks in relation to insider threats is achieved by PAM providing visibility into who has access to what and when, enabling rapid response to suspicious activity.

MHM Skála

MHM Skála is a unique and comprehensive solution for protection against cyber attacks through external suppliers. This solution ensures the security, management and auditing of privileged access of users, contractors and external suppliers who remotely access the internal network. Secure access to critical applications and systems is ensured without the need for a VPN connection, increasing security and reducing the complexity of access management. MHM Skála provides robust protection against unauthorized access and misuse, which is key to maintaining the integrity and security of company data and systems.

Business continuity

Backup

Preventing complete data loss is key to ensuring business continuity. Regular data backup minimizes the risk of losing important information. Antivirus and ransomware protection are essential to keep your backups safe from malware. Securing backups with encryption ensures that data is protected from unauthorized access. Automated backup data validation tests verify that backups are complete and usable for recovery.

Ransomware protection

Quickly restoring clean, malware-free versions of data is key to minimizing the impact of ransomware attacks. Data recovery without paying a ransom is possible thanks to regular backups and robust security measures. This reduces the financial burden and promotes a security culture that does not give in to extortionists.

Disaster Recovery plans

The development of a methodology for the creation of DR plans is the first step towards the effective management of crisis situations. Developing detailed DR plans includes identifying the critical systems and processes that need to be restored first. Regular testing of DR plans ensures that the plans are up-to-date and functional, enabling a quick and efficient response to any disaster.

Cyber security education/awareness

Employee training

Ensuring regular cyber security training is key to protecting an organization from cyber threats. These trainings help employees recognize potential attacks and respond effectively to them. Regular training sessions ensure that employees are constantly informed of the latest threats and security practices.

Ad-hoc training of employees in the field of cyber security threats

Ad-hoc trainings are focused on specific threats and needs of the organization. These trainings can be tailored to different groups of employees to ensure that everyone has the necessary knowledge and skills for their role.

Governance & Cybersecurity Consulting Support

Assessment of compliance with requirements (ISO, ZoKB)

Performing an “organization scan” in terms of the implementation of organizational and technical measures is the first step to ensure compliance with ISO and ZoKB requirements. This process involves analyzing the current state of security measures and identifying areas that require improvement. The result is a road map – a structured description and procedure for achieving compliance with the requirements of both legislation and international standards.

Consulting support

Cybersecurity management consulting provides organizations with expert advice and recommendations for effective security risk management. Asset and risk management consulting includes the identification and assessment of critical assets and potential threats, enabling organizations to better protect their resources. Consulting on the implementation of organizational and technical measures helps organizations to implement and maintain effective security measures. ZoKB / VoKB consultations focus on the specific requirements of these regulations and help organizations achieve compliance. Creating ISMS documentation and setting information security processes ensures that organizations have clearly defined and documented information security management procedures in line with legislation and ISO standards.

Performance of the Security Role “Cyber Security Manager” (MKB)

The cybersecurity manager (MKB) is responsible for managing the information security management system. Regular reporting to the organisation’s leadership ensures they are informed of the current security status and potential risks.