9 steps to IT security
9 steps to build your IT security from scratch. Security Policy and Procedures, Gateway Security, EDR, IAM, MFA, Mobile, VPN, WiFi, BDR and a whole lot more.
9 steps to build your IT security from scratch. Security Policy and Procedures, Gateway Security, EDR, IAM, MFA, Mobile, VPN, WiFi, BDR and a whole lot more.
In an increasingly tough economy, more and more tasks procured from consultants are handed over to staff. We support you in everyday IT at a reasonable price.
If your organization is covered by the legal requirement but still does not have an approved whistleblower system; how to fix this easily and cost-effectively.
MÖTE.AX is the perfect tool for you who need to book meetings with people outside your organization with online registration of meeting attendance.
Email was not designed to be secure from the start. Even if providers strengthen the protection, it is not enough. We offer better solutions for secure email.
E-signing doesn’t have to be expensive or complicated at all, we have the solution for you regardless of whether you have a small or large organization.
Online payments have never been easier, especially with Stripe. We help you with everything you need to get started.
Change Leadership; identify hidden potentials internally and externally with leaders who, through their way of thinking, create innovative and change-dynamic cultures.
Fail2ban is reactive, be proactive with a centralized Fail2Ban system. Read our blog post on how you can expand your current Fail2ban solution yourself.
Our latest investment, the service ANON::form, is noticed in the Swedish magazine Aktuell Säkerhet (page 7, issue 5/2021).