Information and process security

We will help you unravel the legislative tangle.

Process security and the cyber security law

The ever-expanding scope of various organizations and the sheer number of information systems used, create new obligations which are addressed by the provisions of the Cyber Security Act. These provisions are actively overseen by the National Office for Cyber and Information Security. We can help you with all these issues because we have extensive experience regarding the fulfilment of formal requirements of the law and in building organizational and technical solutions focusing on the protection of information in public sector, the commercial sector as well as in special areas such as industrial information systems or healthcare.

Personal data protection

A special field of information protection focuses on the protection of personal data. This type of protection is required by the European Regulation on Personal Data Protection, known as the GDPR. These protective regulations are covered by a specific law (the act on the processing of personal data) and overseen by the office focusing on personal data protection, which has been authorized to perform inspections and impose very high fines. We are competent and knowledgeable in this area, which includes the law and information technology, and are able to advise you how to meet the requirements of the law applicable to various types of organizations. You have probably encountered certain measures related to GDPR requirements and already applied them. However, the interpretation of the law keeps evolving. We can help you verify that the measures you have put in place are still valid and current.

Protection of IT environment

We can protect your IT environment against ransomware and other threats. We will build a sophisticated multi-layer protection for your network using technologies provided by leading security suppliers. We focus mainly on network and application of security - segmentation, network access control based on context (network admission control), multifactor authentication, protection of transmitted data, detection of advanced threats, specialized protection of applications and on protection against distributed attacks aimed at services. We can also secure your company information or cloud systems. We can also protect your loT environment. We ensure uniform processing of security events, separate insignificant noise from important information, and save your valuable time. Thanks to our solutions, you will be able to notice attacks in time, stop them in time and take the necessary steps and be prepared for possible new attacks.

IT security services

Your IT environment is fully secured by modern technologies and its architecture follows modern trends, but you need to have professionals to operate and constantly manage these technologies. If you do not have highly qualified professionals to handle you network it may become incomplete and “leaky” over time. We check your technology administration and management processes and suggest possible optimization. We will also supply you with services capable of executing these processes for you and we will set up the interface between our services and your processes.

Security monitoring

Despite all efforts to prevent attacks and ensure IT security, it is necessary to constantly monitor your network and make sure that the built-in protection works. You also need to know whether any attackers have broken your protection or are currently trying to do so. We will supply you with security monitoring processes, set up the necessary interface at our workplace, which allows us to monitor security technologies 24/7, respond to reported events, perform basic analysis and classification, and provide your experts with solutions in a previously define manner. We are also able to help with these types of solutions.

Other services

Robotic Process Automation (RPA)

Robot is faster. Robot does not make errors and does not get tired. Robot loves doing everything.

More info

Modern IT infrastructure

IT used to be hard work. Not anymore.

More info

Services

We enjoy helping you.

More info

Certificates have a limited validity—often only a few months. You have to change them, and some of them are changed manually. Manual change is laborious. If you have hundreds of certificates in your network, it is not easy to keep track of them. It is easy to miss that some certificates are no longer valid. You only find out when something does not work. Regular changes and troubleshooting take up a lot of your time. CASSIE monitors the validity of certificates for you. It clearly shows you the status of certificates in your network. It notices certificates approaching the end of their validity and renews them. Just watch.

If CASSIE interests you, please send us an e-mail.

PASSENGERA s.r.o.

PASSENGERA s.r.o.

JOINT PROJECT

Passengera, s.r.o., je společný projekt Simac Technik ČR, a.s., Victrix, s.r.o., a Certicon, a.s. zaměřený na vývoj, prodej a provozování informačního a zábavního portálu (platformy) v dopravních prostředcích po celém světě. Společnost vznikla v srpnu 2015 a klade si za cíl změnit k lepšímu cestování na palubách dopravních prostředků prostřednictvím nejpokročilejší informační a zábavní platformy na trhu.

Go to web
THE NETHERLANDS
ENGLAND
BELGIUM
FRANCE
GERMANY
CZECH REPUBLIC
LUXEMBOURG

Simac Technik CZ, a.s.

Prague

Avenir Business Park
(building B, ground-floor)
Radlická 740/113c
158 00 Prague 5

Tel.: +420 283 061 281
Fax: +420 283 061 281
Email: info@simac.cz

data box ID: 9dcgapv

Simac Technik ČR, a.s.

Brno

Traťová 574/1
619 00 Brno

Tel.: +420 545 423 571
Fax: +420 545 423 570
Email: info@simac.cz