To optimize the installation and operation of each network (LAN, WAN, INTERNET) regarding the transmission of voice, data or video (picture), Cosmos undertakes financial and technical studies required to achieve the best possible solution available for each installation.
IT Security Consulting / Auditing Services
1. Site Audit
We record and analyze the customer's infrastructure, both in equipment and in the services it provides.
2. IT Audit - Vulnerability & Risk Assessment
We perform Vulnerability Assessment of customer’s IT infrastructure, combined with the appropriate IT Audit and Risk Assessment related to Business Processes and Assets. The goal is to deliver to high management a detailed
presentation of all risks in the organization’s infrastructure in order to evaluate and prioritize them in time and within budget. Technical Proposals will also be presented based on ISO27001 Technical controls for protecting all IT assets.
3. Optimization
We draw up the economical and engineering study required to achieve maximum return on investment by optimizing its installation and operations.
4. Application Solutions for IT Security Services & Audit
The deliverables of an IT Security Audit and Vulnerability assessment can also include (as an option) POCs from a variety of vendors in order to implement Security solutions to cover specific IT Security needs in the enterprise, like the following:
i) Active Directory Auditing & Reporting (IT Security auditing)
ii) Exchange Server Auditing & Reporting (IT Security auditing)
iii) Active Directory Password management (Password Management/Vault)
iv) Fileserver Auditing & Data Discovery (IT Security auditing)
v) Mobile device Management (MDM/MAM Solutions)
vi) SIEM & Network Threat Correlation (Alerting)
vii) Access Control – Privileged Access Management (PAM Solutions)
5. DOP Services
Analysis of the current situation regarding the protection of personal data from the existing GDPR study
Advisory informative role for group or department managers who process personal data.
Provide instructions and advice on continuous compliance with the regulation (IT and Document Control)
Participation in working groups dealing with PDP processing
Specify the necessary actions for each new process or application, update the PDB and prepare an impact assessment study
Communication and co-operation with the Supervisory Authority (AIFF) on behalf of the organization.