for 25 years ensures continuity and reliability of the IT systems of strategic importance for the functioning of both public administration and business. We focus our activities mainly on the design and implementation of complex and demanding IT systems, especially in the areas of broadly defined information security, authentication and authorization, digital signature, biometrics and identity management. In the implemented projects we mostly use our proprietary hardware and software solutions.
Cryptographic hardware and application solution for processing of classified information into the "CONFIDENTIAL", "CONFIDENTIEL EU" CONFIDENTIAL clause.
Full control over the virtual identity and permissions of users in information systems inside and outside the organization.
Secured work using mobile devices and applications in a distributed environment
Comprehensive platform enabling control of people and places to be monitored.
Tailor-made solutions dedicated to many sectors of the market, adjusted to the specific customer needs and legal or structural requirements .
Secured information exchange for IT sysyems ensuring authencity of the sender, integrity, confidentiality and non-repudiation of content in electronic communication.
Minimizing threats, incident response, monitoring of system logs together with an active security policies within an organization.
Constant and multi-level analysis of incidents in the organization, combined with external monitoring.
Ensuring optimal level of protection of a corporate network and improvement of the service level of the IT department.
Advisory, consulting and technical and project support in terms of IT system security.