IT security services

Verification of IT security as a service.

The security system consists of many elements developed to perfection, and yet it has its weak link. It is simply a human.

T-Mobile provides broadly understood IT security services, under which a qualified team of engineers will provide professional support in the verification and construction of an appropriate IT security policy and appropriate mechanisms to protect against cyber threats.

Bezpieczeństwo i prywatność

Range of services

Penetration tests

Penetration tests of infrastultures, applications and networks according to best practices on the market and simulation of cyber attacks on behalf of the client.

IT security audits

General organizational security level testing, as well as audits for compliance with standards such as GDPR, PCI DSS, ISO 27001.

Training

“Awareness” and specialised trainings for administrators and managers of IT security systems.

Consulting

Advice on IT security system architecture, including comparative tests of various technologies and evaluation of vendors’ products.

Post-incident analysis

Post-incident analysis, malware analysis, examination of traces, which allow for identification of malicious code and collection of evidence according to law.

Laboratory

We also have a dedicated lab for vulnerability testing of Internet of Things (IoT) devices.

Certificates

  • CISSP
  • CSSLP
  • CISM
  • CompTIA
  • Qualys Certified Specialist
  • CEH
  • CVA

  • Offensive Security OSCE
  • Offensive Security OSCP
  • GCFA
  • CRISC
  • CISA
  • ISO 27001

loga certyfikaty

Product
benefits

Awareness of the level of security

Gaining knowledge about the actual state of security of the company by assessing IT solutions, technologies, processes, procedures and policies.

Legitimate investment

Justification of investments related to the safety of infrastructure.

Safe choice

Satisfying top-down requirements (legal, procedural, etc.) through the obtained certificates.

Profitability

Cost optimization thanks to the reduction of hardware and software resources. Reduce the risk of downtime caused by cyber-attacks.

Higher competences

Building awareness of cyber threats in the organization allowing to minimize the risk of cyber-attacks and the related potential financial losses.

Do you have questions or need an offer?

Write to our Business Advisor
Welcome
How can we help you?
5000
...