The administrative part
Accident investigation in the field of information security.
Creating a list of threats.
Protection of information assets of the company.
- Minimization of the potential threats and risks appearance associated with removal and arrest of the techniques, or its consequences
- Designing security policies for the protection of electronic assets of the company
Minimizing of external threats.
Minimization of the potential threats appearance and risks associating with the actual document processing, bearing risks of economic claims from regulators, with inspections of PO legitimacy, with the compliance requirements 152FZ, with the compliance of personnel and labor legislations, with the compliance of sanitary standards.
Minimization of internal threats.
- Designing security policies for the protection of digital assets of the company, transferring policies into regulations and the rules of electronic assets of the company
- The organization of regular verification of rules and regulations compliance
- Пассивное ограничение каналов утечки данных (закрытие интернета, портов USB, периферийного оборудования).
- Issues of the internal audit activities of employees associated with the use of the equipment
- Passive limiting of data leakage channels (closing Internet, USB ports, peripheral equipment)
- Minimization of potential threats and risks associated with the activities of the administrators of information systems
- Analysis of the outgoing / incoming traffic on the company's telephone assets
- Confidential correspondence support for senior staff and management of the company, protected from falling into the hands of regulators, administrators, etc.
IT-part
- Monitoring system of network activity of the company
- Setting software tools (hereinafter System ) allowing to record network activity of employees in the database, to search for this information in a predetermined pattern and, if matched, inform the operator via messages by mobile devices, email, and workplace. After detecting the coincidence the system allows analyzing the information and displays all occurrences of a specified pattern
- The scope of this system is the sphere of information security. That is, if the organization is involved in operation with information that can affect the financial results of the company during its propagation, this system will help the security service to control the spread of this information via the communication channels – by mail, local file sharing , Internet resources
Automation
We offer multi-level system for automation of commercial companies’ activities and public services.
- Automation of accounting in the Company (the automation of procurement, sales, storage, storage facilities, management accounting, financial and tax accounting, production activities, assets accounting, repairs and maintenance)
- Development and implementation of a reporting system for the management of the Company ( unified system of reporting and analysis, convenience and efficiency of reporting data to management, creation of the reports on their own, the ability to use the same report data from various sources, effective and visually displaying data about the Company through dashboards)
- Development of regulations and automation of planning / forecasting activities of the Company (procurement planning, sales, inventory and shipments, demand forecasting)
- Visualization of the company’s activity - the decision-making assistance system (visualization of the financial flows of the Company, the logistics activity, construction processes and design works, marketing activities and changes in stocks)