ESCO has a team of highly qualified experts that work with the customer to detect, analyze and evaluate ICT risks. According to this risk assessment, we work on creating a new or expanded security strategy that involves strict security measures, ensuring the highest possible security level.

ESCO plans, designs and implements custom-made ICT security solutions. Through clearly structured procedures supported by professional and specialized competences, ESCO enables goal-oriented process management, from sound decision-making to compliance with quality, deadlines and costs. During every phase of a project, ESCO considers all aspects that guarantee the reliability and user-friendliness of the system after commissioning.

  1. Risk assessment
  2. Business impact analysis
  3. Security strategy and planning
  4. Information Security Management System
  5. Security awareness
  6. Security audits

  1. Project management
  2. Network security solutions (link, IP-based VPN)
  3. Office security (fax, voice)
  4. Secure mobile solutions
  5. Endpoint security
  6. Secure collaboration solutions
  7. PKI solutions, digital certificates
  8. Perimeter security

The reliability of an ICT security system depends on how well it is operated in practice. Investing in an ICT security system only pays off if all related technical and organizational measures function in the long-term. Thus, when ESCO provides ongoing support for an implemented project, our services are not restricted to standardized inspections and corrective action, but rather include the proactive provision of logistics perfectly adapted to the current situation.

The instruction and training of new customer employees are just as much a part of the comprehensive support as the periodic examination of the entire system configuration. This is part of ESCO’s fundamental work – to continuously analyze the rapidly changing threats in today’s ICT world, and to take successful countermeasures.

  1. Maintenance contracts for system components (hardware/software)
  2. Service level agreements
  3. Security audits
  4. Instruction and training