DISEC is a new spin-off entity of SlovShore mainly providing

security services
in a cyber space

Our company can help you identify threats, analyze them, respond to cyber security attacks, protect data and privacy and manage identities, infrastructure and end-points.

Our company

DISEC is a new spin-off entity of SlovShore, s.r.o. mainly providing security services in a cyber space.

Our company can help you identify threats, analyze them, respond to cyber security attacks, protect data and privacy and manage identities, infrastructure and end-points. Currently we work in-cooperation with DXC.technology for many international companies e.g. bPOST, VW, BMW, etc. to tackle with the security issues with a use of our shared SOC.

Here is our

Security Services Portfolio

Infrastructure & End-point Management and Security

Attacks come from all directions, and many of them originate on endpoints. In fact, according to IDC report, 70 percent of successful breaches begin at the endpoint.

Mobile Security

Smartphones and tablets have quickly become our primary tools for communication, business and entertainment. People use mobile devices to transfer increasing amounts of data and even money, through online banks and other transactions.

Privileged Access Security

The most disruptive attacks center on controlling your most valued assets with privileged access. It’s clear; privileged accounts, credentials and secrets deliver an unobstructed pathway to critical on-premises and cloud-based infrastructure and applications.

Security Testing, Network and Cloud Security​​

Network and cloud security are essential to assess the security of your operating systems and applications running on network and in the cloud.

Application Security

It has long been understood that a successful attack requires the exploitation of reachable vulnerabilities, which result from inherent weaknesses (design, implementation, or configuration flaws).

Security Risk Management & Security Analytics

Security Risk Management is an ongoing, proactive program for establishing and maintaining an acceptable information system security posture.

Our references

Do You Want To Boost Your Cyber security?

Drop us a line and keep in touch.