| Business Activities |
-
Information security and cloud security advisory
(consulting/advisory) and audit support based on CISSP
(ISC2)
-
Cloud (AWS) architecture design, security implementation,
configuration assessment, and incident response advisory
-
Secure communication design for IoT/embedded systems with
VPN, zero-trust operation design, and network management
-
Consulting, planning, research, development, sales,
maintenance, and leasing of computer software and hardware
- All related business activities
|