top of page


Risk & Compliance Management. Adapted by leading methodologies and regulations 


Mapping assessment

Find, identify and list all your OT and IT devices. Evaluate device vulnerability score while including all hardening capabilities.


Cyber and information security policy

Aligned with internationally recognized standards, risk based, outcome focused, technology neutral and always oriented with privacy regulations.


cyber risk assessment

Reporting on human, IT and ICS level vulnerabilities by enumerating risk level. Using leading standards and regulations such NIST, SANS, OWASP, PERA model and more.


work plan

A work plan to reduce gaps arising from a risk assessment, or alternatively, according to regulatory requirements. The work plan includes gaps, recommendations, goals and a realistic timeline.

bottom of page