Industrial licensed or open-source products for
Threats intelligence and auditing information assets from a cyber security perspective
assessment of existing weaknesses in the protection of available assetsIntegration and operational monitoring of the state of information systems and networks through firewalls and IDS/IPS systems
Periodic tests of the security of corporate sites, information systems and networks