camera icon
Technology, assemblies,
systems, installations
plus icon
safe icon
Security, trainings,
protected transports
plus icon

Technology, assemblies, systems, installations.


Data theft and countersurveillance.

We will audit and check the condition of your physical security systems as well as the key employees for potential data theft by applying social engineering techniques. The most effective method for securing your own e-environment include audits and verification tests. We offer audits based on ISO 27001, ISO 22301 and COBIT technology. We check the system for compliance with regards to personal data safety and information security administration. We develop written reports and analyses. We select and provide advice on hardware security systems.