About us

8
YEARS
6
COUNTRIES
50
EXPERTS

What
we offer

Technical solutions implementation

Information security audit and consulting

Maintenance and support for continuous security

Our
results

300+
PROJECTS

Join us

CONFERENCES, SEMINARS, TRAININGS

Continuous support
at every project stage

Assessment

Security tests

Gap analysis

Remediation guidelines

Consul­ting

Compliance management

Strategy and policies

Trainings and awareness

Integra­tion

Infrastructure assessment

Design a solution concept

Technical evaluation

Solution integration

Manage­ment

Security incidents monitoring

Remediation and forensics

Managed Services

CONTACT MANAGER

Featured

ISSP – like-minded company

Stay informed about information security trends and learn more about ISSP strategy and approaches

"IS as a service" or in what direction information security market is moving

PDF / 311KB

Stop reacting, start preventing

Learn how to be always one step ahead of cybercriminals

A security solution must be able to detect and correct threats, rather than reacting once something has already gone awry.
Intel Security provides and extended approach to the proactive security made of:
- automation,
- adaptability and
- continuous response and monitoring.

[blogs.mcafee.com]

Gartner's Top 10 Technologies forInformation Security

Find out what trends rules in the security and why

Neil MacDonald, vice president at Gartner, spoke about the latest technology trends for 2016 that allow information security teams to provide the most effective business support and risk management.

[www.gartner.com]

Industry solutions

Effective cybersecurity solutions, designed to meet industry requirements and standards

Banks
& Insurance

Telecom
& Media

Energy
& Utilities

Pharmaceutics
& Healthcare

Manufacturing
& Technologies

Retail
& Logistics

Government
Institutions

Infrastructure
& Transport

Projects and testimonials

Why ISSP is trustworthy?

PJSC "VTB Bank" wants to acknowledge the successful completion of testing the security level of the Bank's corporate network.

Vladislav Dovganich

CISO

Securing Network Infrastructure of Carlsberg Ukraine

Comprehensive network infrastructure analysis

Automation of the security policies settings

Integration with an active vulnerability scanner

Upgrading the endpoint protection management server in Alfa-Bank

Optimization of McAfee ePO architecture

Scheduling the backup and recovery

Upgrading server's software to the current version

Imperva Web Application Firewall is a key component of 1+1 Media network security of external perimeter

Blocking web applications external attacks

Analyzes all user access to business-critical web applications

Granular policy controls enable superior accuracy

Conferences, seminars, webinars

Expand your knowledge and advance technical skills

Nov., 03-07, 2016

Training

CEH v9 | Certified Ethical Hacker v9

Timing: 9:00 - 18:00

Nov., 10-14, 2016

Training

CHFI v8 | Computer Hacking Forensic investigator v8

Timing: 9:00 - 18:00

Nov., 10-14, 2016

Training

CISSP | Certified Information System Security Professional

Timing: 9:00 - 18:00