Cybersecurity services

Four service lines to build the security posture your company needs today.

01

🔍

Security audit & diagnosis

Assessment · Risks · Prioritisation

4–6 weeks

The first step of any solid security strategy is knowing exactly where you are. Not where you think you are — where you actually are. Our audit combines technical evaluation with strategic analysis to give you an actionable risk map.

What is included

Attack surface analysis

Complete inventory of exposed assets and entry vectors

Controls assessment

Review of technical, organisational and process controls

NIS2/DORA gap analysis

Identification of regulatory gaps with remediation plan

Threat modelling

Threat modelling specific to your sector and risk profile

Executive report

Board presentation with prioritised risks and defensive ROI

90-day roadmap

Action plan with milestones, resources and progress metrics

02

🛡️

Zero Trust architecture

Identity · Network · Data · Endpoints

3–5 months

Zero Trust is not a product you buy. It is an architecture you design and implement layer by layer. We start from your current infrastructure and build the right defensive capability for your organisation without breaking operations.

What is included

Architecture design

Zero Trust blueprint adapted to your current technology stack

Identity & Access Management

MFA, SSO, privileged access management implementation

Network microsegmentation

Network segmentation to limit lateral movement

Endpoint security

AI-powered EDR for endpoint detection and response

Data classification

Classification and protection of critical information assets

Team training

IT team training on operating the new model

03

🤖

AI-powered SOC

Detection · Response · Automation

2–4 months

A traditional SOC drowns in alerts. An AI-powered SOC filters the noise and only escalates what requires human judgement. We design and implement the security operations centre your company needs — scaled to your size and budget.

What is included

ML-powered SIEM

Implementation or upgrade of SIEM with machine learning capabilities

UEBA

User and entity behaviour analytics for insider threat detection

SOAR

Orchestration and automation of response for known threats

Threat intelligence

Integration with global intelligence sources in real time

Response playbooks

Development of automated playbooks for the 20 most common scenarios

Metrics & reporting

Executive dashboard with security KPIs and evolution

04

📋

NIS2, DORA and GDPR compliance

Regulation · Compliance · Penalties

2–3 months

Cybersecurity regulations have tightened significantly. NIS2, DORA, GDPR and ENS are not optional. But compliance does not have to paralyse the business — it can be built in a way that strengthens real security at the same time.

What is included

Regulatory gap analysis

Assessment of distance between your current situation and compliance

Remediation plan

Prioritised roadmap to achieve compliance

Policies & procedures

Development of security policies, incident management and BCP

Executive training

Board and senior management sessions on obligations and responsibilities

Incident simulation

Tabletop exercise to validate the response plan

Notification support

Support in case of real incident for 72h notification

Request free diagnostic