COMPUTER SECURITY – COMPUTER FORENSICS

Computer forensics is a dynamic and rapidly developing field. Our company is one of the pioneers of computer forensics in Poland. The professional services offered by Interguard have been appreciated by many corporate clients and individuals. We propagate knowledge about a variety of topics related to computer forensic science . We conduct classes for the safe administration of classified information at the Faculty of Computer Science and Materials Science at the University of Silesia.

The offer includes:
• Detection and neutralization of malware (viruses , Trojan horses, keyloggers , rootkits , etc.) ;
• Analysis of network security used for safety of processed information in wired and wireless networks ;
• Design and implementation of security policies ;
• Development of safety documentation ;
• Protection of networks connected to the Internet ( hardware and software firewalls , secure email , remote    access to company’s network resources using VPN tunnels ) ;
• Administration of computer systems and networks :

  • design and implementation of network infrastructure ;
  • implementation of services , network servers , workstations ;
  • remote administration of systems ;
  • backing up the data ;
  • supervision of the implementation and development of the IT system;
  • monitoring of the network and systems;
  • combining a multi-location business networks ;

• Recovery of data with a guarantee of confidentiality from:

  • hard drives,
  • USB flash drives ,
  • memory cards ,
  • optical storage media,
  • other devices that store information in the electronic form.

• Secure Deletion of Data with the guarantee of confidentiality from

  • hard drives,
  • USB flash drives ,
  • memory cards ,
  • optical storage media,
  • other devices that store information in the electronic form.

• utilization of waste storage media with a guarantee of confidentiality.
• Inventory of hardware and software .

We prepare expert evaluations on:
• Analysis after breaking into the system
• Studies related to the violation of security policies
• Suspected employee dishonesty
• Identification of the identity of a person based on network information
• Participation in data security
• Recovery and search for information
• Extracting data indicated
• Comparative analysis