PORTFOLIO

Portfolio

Our products and solutions are used by international organizations as well as global technology companies and suppliers in the field of security and defence. They are customized for each kind of customer and we can implement them all over the world. The services are based on our years of experience and know-how, which is made up of highly qualified staff.

Special
Systems

ICT
& Cloud

Cyber
security

Software
development

Special
systems

ICT
& Cloud

Cyber
security

Software
development

PRODUCTS

Products & Solutions

1
2
3
... 6
Security incidents analysis and response
Solutions
Security incidents analysis and response

Security incidents analysis and response executes an in-depth analysis, identifies the cause and performs remedy.

Security analysis of a virtualized environment
Solutions
Security analysis of a virtualized environment

Security analysis of a virtualized environment helps eliminate threats in real time and offers immediate solutions.

Detection of IT infrastructure vulnerabilities
Solutions
Detection of IT infrastructure vulnerabilities

Detection of infrastructure vulnerabilities provides information about the security posture of systems, and offers to increase level of security.

Cloud Service Provisioner
Products
Cloud Service Provisioner

The Cloud Service Provisioner (CSP) is a tool for private-cloud management with a high added value.

COMTANET<sup>®</sup>
Products
COMTANET®

COMTANET® of the second generation provides IP based voice, data and video teleconferencing services at military tactical command posts.

COMTAG<sup>®</sup>
Products
COMTAG®

COMTAG® provides voice and data services for highly mobile tactical units on the move.

Enterprise Service Orchestrator
Products
Enterprise Service Orchestrator

ESO allows the implementation of business processes for managing communication between systems at application level.

Aliter CC
Products
Aliter CC

We build multi-tenant call centers for the most difficult conditions, including supporting tools for effective and efficient operations.

Monitoring and analysis of network communication
Solutions
Monitoring and analysis of network communication

Monitoring and analysis of network communication helps to more easily detect illegitimate communication or various anomalies.

Protection of organization’s critical infrastructure
Solutions
Protection of organization’s critical infrastructu...

Protection of organization’s critical infrastructure – the purpose of this solution is to protect assets as a perimeter and to encrypt data.<...

Intelligent security monitoring
Solutions
Intelligent security monitoring

Intelligent security monitoring provides the ability to automate anomaly detection and reveal every other performance degradation within IT.

VIMA &#8211; Virtual Mast
Products
VIMA – Virtual Mast

VIMA (Virtual Mast) is a solution fully replacing the classic mechanical mast that is used as a carrier of devices.

1
2
3
... 6