Audit and Harden Networks.

We consider development, implementation and analysis of security concepts as a continuous cycle.

Firewall concepts and hardened servers are - in addition to monitoring, incident response, forensics and pentest - key components of our contribution to IT and network security.