Audits, proposals, solutions implementation
Access & Identity Management
IAM / SSO / authorization management
processes and tools to centralize, streamline access, and authorization management within the extended enterprise.
Applications & Information Security
Application code audits, vulnerability assessment and recommendations.
Design, architecture, deployment and management of cyber security (firewall, VPN, intrusion detection and prevention, web proxy, web application firewall, antivirus, antispam).