Services / What we do


Security Tool Commissioning

In order to meet today’s threats and regulatory requirements, many organizations have procured SIEM (Security Information and Event Management), FIM (File Integrity Management), IPS (Intrusion Protection Systems), IDS (Intrusion Detection Systems) and DLP (Data Leakage Protection) systems – only to have them operate in an unconfigured default state, sometimes left unmonitored due to the excessive amount of alerts security tools generate out-of-the-box. By bringing in an external resource to address the commissioning of your network and endpoint security tools, your operations team can remain focused on their regular tasks; once tuning and handover training is completed, your team can manage and monitor threats ...


Penetration Testing

A penetration test is a method of evaluating the security of a computer system, application, or network by simulating an attack from either insiders or outsiders malicious. The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker and usually involves active exploitation of security vulnerabilities. The three main types of penetration testing are: – Wireless penetration testing – Network penetration ...


Security Policy Development

Through the development and subsequent maintenance of a documented security ruleset (generally comprised of policies, processes, standards, and procedures), organizations define a framework of how the business is expected to be run. An experienced specialist in policy development can help organizations define necessary security-related implementations and behaviors, and capture them in documents that are aligned with existing methodologies as well as with your corporate culture. Define policies that attain objectives; Adapt existing processes to meet new needs; Align with standard security policy frameworks; Comply with regulatory standards.


Vulnerability Assessment

In order to combat the constantly increasing number of threats, organizations must become proactive to identify risks in their network security. The Vulnerability Assessment represents the first level of the Proactive Security services. It is a security test based on the execution of non-invasive, automated and semi-automated scans. The purpose of these scans is to detect the presence of known vulnerabilities within the client’s IT infrastructure. The scan results are then reviewed by our specialists who will provide the most accurate reports and detailed remediation instructions.


Security Audit Management

An independent internal auditor can help an organization meet audit objectives, by managing the entire process and tracking progress, minimizing the impact on team members. Ensure adequate documentation; Check compliance levels before audits; Prepare staff and accompany auditors; Assure post-audit remediation.


Risk Assessment

Risk assessment is the determination of the quantitative or the qualitative value of risk related to a concrete situation and a recognized threat. Our company utilizes a methodology based on ISO27005 standard in order to identify and evaluate the risks that your company is exposed to. Analysis having been made, we recommend the most suitable measures to be taken in order to mitigate the risks.

Our Team

Lucian Andrei
Lucian AndreiCEO
Cristian Man
Cristian ManIT Specialist
Alex Andrei
Alex AndreiJunior Analist
Montreal, QC




info (@)