Cybersecurity

At CREAplus we implement cybersecurity solutions and provide related services to prevent intrusions, detect vulnerabilities in IT systems, and generally increase the level of enterprise IT security (deployment of extended detection and response (XDR) solutions, two- or multi-factor authentication, electronic signature, appropriate generation and storage of cryptographic keys for encryption, etc.). Depending on the technology, complexity and scope of the project, we include domestic or foreign experts and IT security solutions from different vendors.

CREAplus solutions and services in the field of protection against advanced cyber threats include:

  • System security review: review, preparation of expert report, preparation of proposal of appropriate IT security solutions.
  • Identifying security incidents: Proactive monitoring of resources and flows, detecting anomalies, classifying incidents, providing information to response teams, and initiating response.
  • Incident restriction: Response in the form of system isolation and prevention of the spread of malicious activity; eliminating causes and identified vulnerabilities, and preventing recurrence or spread.
  • Restoration: Planning and implementation of the restoration; incident analysis, identification and implementation of risk mitigation measures, learning and improvement of the incident response process.
  • Analysis: Forensic activities: malware analysis, end-client threat detection and elimination (EDR), network behavior analysis of clients (UEBA), Vulnerability analytics, patch management.
  • Incident management: Reporting and informing incident participants.
  • Proposal for improvements and appropriate IT security solutions.
Please contact us by sending an email to This email address is being protected from spambots. You need JavaScript enabled to view it. to find out more details about our cybersecurity solutions and services.

News

What is the difference between a General Purpose and Payment HSM?

blockchainAlthough we do not give much thought to hardware security modules (HSMs), they are a critical element of security in an organisation’s IT infrastructure used for securing sensitive data.

Read more ...

Hardware Security Module (HSM) Explained

blockchainA hardware security module (HSM) is a small device that allows you to create, manage, and store cryptographic keys. They are considered one of the most secure ways to protect sensitive encrypted data.

Read more ...

The Role of HSMs in Public Key Infrastructure (PKI)

blockchainThe underlying hardware security modules (HSMs) in publick key infrastructure (PKI) are the root of trust which protect PKI from being breached. 

Read more ...

Providing a Secure Blockchain Through the Adoption of HSMs

blockchainThe strong cryptography provided by HSMs will become crucial to blockchain-based fintechs as they generate, store and protect the private and public keys that form the ‘root of trust’ in blockchains.

Read more ...

Hardening your AD FS servers with HSMs

adfssecMicrosoft provides best practices for the secure planning and deployment of Active Directory Federation Services (AD FS) and Web Application Proxy.

Read more ...