CUISDI INVESTMENT SRL
Sede sociale: B-dul Socola nr. 44, mezzanin 6 | Iasi-Romania |
Partita IVA: 40962446
EUID: ROONRC.J22/1529/2019
CYBER DEFENCE
Namirial offers customized solutions and services for the defense of your business from cyber attacks.
ASSESSES AND MITIGATES CYBER RISK WITH OUR SOLUTIONS
THREAT INTELLIGENCE
Namirial services provides Cyber Threat Intelligence effective, cutting-edge, our monitoring systems are able to support the professionals of security in the detect and understand cyber attacks by hacktivist groups, understand the attack methods emerging, assess their technology risks, identify the disclosure of proprietary and/or confidential business.
CONTINUOUS ASSESSMENT
The service of Continuous Assessment enables organizations to detect periodically and continuously the vulnerability of the information infrastructure on the perimeter of the network. The service allows you to reduce the risk arising from cyber attacks in a fast and timely, before the vulnerabilities could be exploited by attackers.
CYBER SECURITY CONSULTING
The offer Cyber Defence also includes professional consulting services for activities such as Vulnerability Assessment/Penetration Testing, forensic analysis, design and development of security platforms customized, strategic advice on Cyber Security.
MALWARE INTELLIGENCE
Cyber attacks against organizations, companies and government agencies, are in constant increase and the spread of malware increasingly sophisticated makes traditional defenses ineffective.
The service of malware intelligence aims to detect attacks APT (Advanced Persistent Threat), by intercepting from the outside the corporate network traces of infection from malware coming from the network of the customer.
EVALUATION PLATFORM COMPUTER
The platform and Cyber Assessment is an innovative proprietary platform that is able to make an assessment of cyber threats to an organization from an external point of view, without having to install any software inside the same.
This platform helps organizations to comply with article 32 (d) in which they must make reference to the General Data Protection Regulation (GDPR).
The results of this analysis are advantageous for companies because they help to assess the effectiveness of security controls, identify threats and security gaps in the technology areas, giving priority to investments to fill the gaps.
In this way, organizations will be able to invest time and money in the areas most relevant/appropriate and prevent the loss of resources due to cyber attacks that are based entirely on risk assessments of the theoretical and ineffective.