Cyber-security:
we create implement and control the strategy

Cyber-attacks against companies are widespread. A survey conducted in 2017 by KPMG in Poland shows that 82% of organisations per year experienced at least one attack on their IT infrastructure. Furthermore, companies have seen an increase in attacks against their organisations in the last year.

Implementation of security systems

Protecting, managing, troubleshooting

Developing a strategy for information security

We create documents governing the methods and rules for protecting information

Checking that the configuration conforms with regulatory requirements

ISO certificates, recommendations of financial supervision authorities

Maintenance inspections of the environment

Verification, analysis and standardisation

Assessing the effects of an attack

Developing a plan for reacting during an attack

Increasing the competences of employees

Training for your employees and IT team

As part of cyber-security solution, we offer our customers:

Implementation of cyber-security solutions

We offer the following services and implementations:

Protection of network interconnections
Protection of terminal equipment
Management of your mobile devices
Identity management and multi-component authentication
Detection of anomalies and attacks on your infrastructure and communication systems
Ensuring the availability of your data (backup)
Controlling access to information in your organisation
Classification of information and flow control
Public Key Infrastructure (PKI)

Developing a strategy for information security

Each organisation should have a plan for information security, i.e. a set of documents governing the methods and policies for the protection of information. The plan should take into account the existing laws, industry regulations and internal rules regarding the information security. We offer our clients:

Mechanisms for ensuring confidentiality, integrity, and availability
Automatic classification of information
Information security risk reduction
Preparedness to act in a crisis

Control over compliance with regulations

Each organisation operating on the territory of Poland is obliged to comply with the laws of the European Union and Poland. Certain provisions require companies to comply with important requirements for IT systems and in particular for their security. Failing to comply with these requirements may be a vector for attacks, and consequently expose the company to legal consequences or damage to reputation. Some organisations are also required to comply with industry regulations, such as the recommendations of the Polish financial supervision authority, or with requirements set out in internal standards. Regular verification of the level of compliance with the regulation is included in the permanent course of action in the organisation. As part of our services we offer:

Implementation of requirements from certificates ISO/IEC 27000
Recommendations of a financial supervision authority
Protection of personal data (RODO)

Verification for compliance with regard to current risks

Each computer system should be verified for compliance with regard to current risks. It is natural that this task should be carried out by a team of external experts who are independent from the team that has provided the configuration of IT systems. The role of the auditor is to conduct activities similar, or even identical to a real attack. What is different is the action taken after a successful test attack in the test: the auditor does not take destructive actions that have not been agreed upon with the contracting party. Detected irregularities are logged as risks that may be the basis for a decision to deploy adequate security systems. We offer our customers:

Verification of whether the configuration complies with the accepted standard
Analysis of vulnerabilities in production systems
Standardisation of the environment

Impact assessment

An increasing number of security experts point out that cyber-attacks are equally probable in all organisations. An attack is a matter of time rather than of security level. Therefore, there are more and more discussions about reactions to attacks rather than about avoiding or predicting them.

Raising employees’ awareness of threats

Several studies on cyber-security report that the predominant risk is posed by actions taken by employees. What is meant here is social engineering used by attackers, but also informed actions taken by users. Each organisation should allocate budget resources to constantly raise their employees’ awareness of threats. Only through regular training can this situation be improved. We offer:

Training for IT teams
Training for business teams

Let’s combine your needs with our experience and passion for technology.

APN Promise logo
APN Promise

For over 25 years, we have been creating IT solutions for business based on the latest technologies. We help companies to go through the process of digital transformation, offering our consulting, implementation and support service as well as sharing knowledge by our educational programs.

Based on the experience gained and the daily work with companies from all sectors and industries, our team is committed to providing proven and useful IT solutions tailored to the needs of our clients.

In addition, we offer a number of services in the CSP model.

Meet our company

Questions about Cyber-security? Write to us!


I want to receive marketing content from A.P.N. Promise S.A. electronically
I want to receive marketing content from A.P.N. Promise S.A. by phone

The controller of personal data collected using the form is A.P.N. Promise S.A. The data provided by you will we processed to the extent necessary to make or fulfil a specific request in accordance with art. 6(1)(b) of the GDPR or in the event of consent in accordance with art. 6(1)(a) of the GDPR to provide marketing content by electronic means or by telephone devices. All information regarding the processing of data provided by you in the data form and your rights can be found in the Privacy Policy or by contacting the person responsible for personal data protection at iodo@promise.pl. Click or write and find out more if the information provided above is not clear enough for you!

Zarejestruj się i przetestuj APN Meeting Room

Wypróbuj system rezerwacji sal w praktyce, na Twojej infrastrukturze.
Wersja demonstracyjna umożliwia Ci instalację oprogramowania na 3 urządzeniach.

Chcę otrzymywać treści marketingowe od A.P.N. Promise S.A. drogą elektroniczną
Chcę otrzymywać treści marketingowe od A.P.N. Promise S.A. telefonicznie

Administratorem danych osobowych gromadzonych z wykorzystaniem formularza jest A.P.N. Promise S.A. z siedzibą w Warszawie. Kontakt z osobą odpowiedzialną za ochronę danych osobowych jest możliwy za pośrednictwem adresu e-mail: iodo@promise.pl. Podane dane będą przetwarzane w zakresie niezbędnym do realizacji określonego żądania zgodnie z art. 6 ust. 1 lit. b RODO, w zakresie niezbędnym dla prawidłowej realizacji żądania oraz oferowania i świadczenia usług, marketingu produktów i usług własnych oraz przeprowadzenia ankiet i oceny satysfakcji zgodnie z art. 6 ust. 1 lit. f RODO przez okres niezbędny dla realizacji celów oraz w przypadku wyrażenia zgody na podstawie art. 6 ust. 1 lit. a RODO w celu dostarczenia treści marketingowych środkami komunikacji elektronicznej lub za pomocą urządzeń telefonicznych.

Przysługuje Ci prawo do żądania dostępu do danych osobowych, ich sprostowania, usunięcia lub ograniczenia przetwarzania, jak również prawo sprzeciwu wobec przetwarzania, prawo do przenoszenia danych, a także prawo złożenia skargi do organu nadzorczego, którym w Polsce jest Prezes Urzędu Ochrony Danych Osobowych. Podanie danych jest dobrowolne, jednak niezbędne dla realizacji powyżej wskazanych celów. Odbiorcami danych mogą być podmioty lub osoby obsługujące administratora w zakresie w zakresie hostingu, komunikatorów internetowych, usług IT, księgowości, archiwizacji. Więcej informacji w Polityce Prywatności oraz Regulaminie.

Register and test the APN Meeting Room booking system.

Registering and installing the trial version you are allowed to install the software on 3 devices.

I want to receive marketing content from A.P.N. Promise S.A. electronically
I want to receive marketing content from A.P.N. Promise S.A. by phone

The data controller of personal data collected using the form is A.P.N. Promise S.A. with its registered office in Warsaw. Contact with the person responsible for the personal data protection is possible via following e-mail address: iodo@promise.pl. The given data shall be processed to the extent necessary to carry out specified request in accordance with art. 6(1)(b) of GDPR and to the extent necessary for the correct realization of the request and offer and provision of services, own product and services marketing and conducting surveys and satisfaction ratings in accordance with art. 6(1)(f) of GDPR for the period necessary to achieve the purposes and in the event of consent in accordance with art. 6(1)(a) of the GDPR to provide marketing content by electronic means or by telephone devices.

You have the right to request access to your personal data, rectification, deletion or limitation of processing, as well as the right to object to processing, the right to transfer data and the right to lodge a complaint with a supervisory authority, i.e. the President of the Personal Data Protection Office in Poland. Providing data is voluntary but necessary for the realization of the above-mentioned purposes. Recipients of data may be entities or persons servicing the data controller in the field of hosting, instant messengers, IT services, accounting, archiving. More information in the Privacy Policy and Regulations.

Cybersecurity w obszarze zarządzania zasobami oprogramowania

Napisz do nas, a skontaktujemy się z Tobą i bezpłatnie porozmawiamy o Twoim poziomie cyberbezpieczeństwa w obszarze SAM.

 

Administratorem danych gromadzonych z wykorzystaniem formularza jest A.P.N. Promise S.A. Podane przez Ciebie dane będą przetwarzane w zakresie niezbędnym do podjęcia kontaktu lub realizacji określonego żądania zgodnie z art. 6 ust. 1 lit. b RODO przez okres niezbędny dla realizacji Twojego zgłoszenia. Wszelkie informacje w zakresie przetwarzania podanych przez Ciebie w formularzu danych oraz posiadanych uprawnieniach znajdziesz w Polityce prywatności. Kliknij i dowiedz się więcej jeżeli informacje podane powyżej nie są dostatecznie jasne!

Zostaw adres mailowy i nie przegap kolejnego szkolenia!

[contact-form-7 404 "Not Found"]