MAGYAR | ENGLISH | DEUTSCH | РУССКИЙ

Data protection, anti bugging
IT vulnerability analysis

 

 

Data protection, anti bugging

 

Securing high profile negotiations against bugging.

 

Preventing phone and fax wiretapping.

 

Total checking of designated premises, especially for bugs and hidden cameras with data protection in mind.

 

Checking the Employer's vehicles for any hidden threat.

 

IT vulnerability analysis

 

We explore computer networks for security threats and breaches if any. We fully survey the current network and propose optimal changes to create a safer one with details of the security hardware and software products to be purchased.

 

Creating secure networks

The deficiencies discovered while analyzing the network in question are overcome by installing a combination of hardware and software products that best satisfy the specific security needs of our customer. We not only recommend but also install the required hardware and software. We not only assist in purchasing and installing these products but regularly upgrade, maintain and monitor them as well.

Inquiries


Request an offer and/or more information completing our online form, or in person, by phone, via email or conventional letter. For details see our Contact page.

More

 

Quality


We are licensed by the Ministry of Justice, member of the relevant chamber and fully insured.

More

 

Partners, VIP offers


Browse our partners and current VIP offers.

More

Terms of use | Credits | Progrespol Kft. © 1997-2010