Introduction


Information has become the most valuable intelectual property for all organisations. The number of the IT security breaches is increasing in an extraordinary level each year both in the private and in the public vertical - this is supported very much by those megatrends (like mobility, cloud computing or IoT) that we consider as the 4th industrial revolution. High number of the external threats will become a breach through these megatrends resulting in possible solid loss in IP or actual dollars threatening even for the largest global enterprises. Our objective is to quantify the real digital risk for our customers and to demonstrate the identified IT risks and the associated solutions. Datron as the specialist of digital data & system protection we target to prepare our customers for becoming resistant against the constantly changing threat landscape.

Our seasoned consultants and specialists have been trained since 1996 and acquired the most relevant industrial certificates and have earned significant operational experience in solid projects of various fields (penetration testing, legal/ethical hacking, risk assessment, design and architecture planning etc.). Beside the complex value added security consultancy field our customers can rely on our project management, system integration and on architecture design capabilities even for the most complex IT security infrastructure - by considering the most relevant and current landscape of risks and threats.

We take our customer’s expectations into consideration first and most importantly in order to prepare tailored proposals for the particular needs. This way we ensure long lasting resiliency across the entire organisation.

Tailored ITS solutions, professional services, innovative technologies.

Best of breed quality.


Solution taxonomy


  Infrastructure services

  • IT infrastructure development related planning, development and quality assurance
  • Project management, QA, IT strategy planning
  • IT infrastructure design and architecture planning
  • Optimising IT operations
  • Outsourcing planning and management

  Information security and risk management services

  • Legal hacking, penetration testing
  • Software testing (binary, source code, process stress testing, performance testing)
  • Forensics (investigation, expert witness activities)
  • Auditing IT systems (ISO27001, COBIT, BS7799, Common Criteria)
  • Data loss investigation and prevention (DLP, ILP, Net-DLP, Content Filter, Mail/File Indexing)
  • Compliance audits (National Bank (former PSzÁF), SOX)
  • Data management (data analysis, data warehouse, data clearing etc.)
  • IT, multimedia and mobile technology analysis, market assessment, compliance checks
  • Identity and access right review
  • Segregation of Duties (SoD) analysis
  • GDPR preparation and readiness review
  • Business Continuity Planning, Disaster Recovery Planning
  • IT Security Strategy planning

  IT Security Infrastructure services

  • Endpoint protection, antivirus protection system planning, implementation and optimisation
  • Implementation of system encryption (file share, whole disk, mobile storages, mail systems etc)
  • Hardening of virtual environments (authentication, vCenter Proxy etc.)
  • Implementation of integrated security systems (DLP, encryption, endpoint & perimeter protection)
  • Symantec competency (SEP, SMG, DLP, PGP, CCSuite)
  • Telecommunications security:
  • Next generation firewalls (PaloAlto Network) 
  • VPN 
  • Email Security (antivirus, antispam, traffic shaping) 
  • Data removal , data erasure, hard disk shredding

Consultancy services for organisation development

  • General organisation development services (organisation, process, roles and responsibilities, decision making etc.)
  • Optimisation of efficiency, rationalisation
  • Maturity analysis of IT and digital systems that supports the organisation’s efficiency
  • Alignment of business operations and IT (office automation)

Specialized consultancy services

  • Application vulnerability assessments, breach prevention
  • Early warning on security vulnerabilities
  • Analysis of IT incident’s, support of intrusion forensics
  • Supporting awareness and education of software developers, securing software development
  • Providing IT security services for internal projects
  • Discovery of internal risk and threat, data loss and monking tests)
  • Binary and source-code audit
  • Transaction, access and data storing tests
  • Log, event and downloaded code analysis/audit

IT security system competencies

  • Perimeter protection
  • IDS/IPS
  • Data Loss Protection
  • UBA
  • Identity ManagementM
  • DB Protection