Our company develops and realizes systems of complex information security which meet the following requirements: Differentiation of access to information; Authentication and authorizations; Cryptographic information security; Firewalling; Control of e-mail and Internet traffic; Reserve copyings of data and emergency recovery; Segmentation of local networks; Anti-virus information security; Monitoring and prevention of invasions; Control of technical means of information security.
Project information security implementation includes the following stages: Tasks determination and development of the specification; Designing and testing; Implementation and delivery of system in operation; Maintenance and technical support.
For the order of service you can use a form in the bottom of the page, and also directly receive a value assessment of works if attach the specification.