Services & Products

Here you can find an open catalog of services and products we provide at EFIGO.
We offer comprehensive services in the field of cybersecurity and data protection.
cyberbezpieczeństwo - testy penetracyjne

Penetration Testing

At the client's request, we conduct controlled attacks in a specially prepared test environment corresponding to the production environment.

We look for vulnerabilities and prepare proposals for solutions to fix them.

We use OWASP, Offensive Security, PCI:DSS, NIST, PTES, and ISSAF methodologies. We perform source code reviews with optimization.

Due to the constant development of cybercrime, it is recommended that each organization commission penetration tests at least once a year.
Explore more
cyberbezpieczeństwo - testy socjotechniczne

Social Engineering Tests

By testing the level of employee security, we limit Employers' losses resulting from cyber threats. We also examine the effectiveness of anti-spam algorithms.

We conduct open intelligence to seal information that flows out of the organization in an uncontrolled manner.

We use various methods

- Phishing (spear, clone, whaling),
- Pharming,
- SMS phishing,
- Fake websites.
Any employee in an organization can become a victim of an attack. Our job is to determine the organization's resistance to social engineering attacks and identify areas for improvement.
Explore more
cyberbezpieczeństwo - testy infrastruktury

Infrastructure Security Tests

We perform security tests of all components of IT and telecommunications infrastructure under many different scenarios, estimating risk and assessing business continuity.

We test:

- Network Interface.
- Local Area Network (LAN).
- Wireless networks.
- Network devices.
- Active Directory / LDAP.
- Firewalls (including integrated UTM devices).
- Passwords in use.
- Anti-virus software.
We also provide hardening services, which increase the resistance of infrastructure elements to attacks by giving them a personalized, advanced configuration.

Regardless of the solutions you use, we will help you ensure the desired level of security by indicating weak points and recommending corrective actions.
Explore more
cyberbezpieczeństwo - testy infrastruktury

Performance Tests

We conduct performance tests using the best tools available.
We can test your websites as well as complex web applications.

We also test applications located in the clouds of global providers, using methods suitable for their architecture.

Types of tests we perform:

- Load Tests.
- Capacity Test.
- Stress Tests.
- Endurance Tests.
Performance Tests are recommended while you: creating a new system, expanding the application with key functionalities or modifying it. As well as in the case of errors whose source is not accurately identified, or as a result of the need to identify so-called bottlenecks or boundary conditions.
Explore more

Security Audits

We can perform security audits as well as part of a cyclical service.

We will check whether you meet the requirements of:

- General Data Protection Regulation (GDPR).
- National Interoperability Framework (KRI).
- National Cybersecurity System (KSC).
- National Health Fund (NFZ).
- Financial Supervision Commission (KNF).
- ISO 27001.
We can help you prepare the documentation for the Information Security Management System (ISMS) in accordance with the requirements of ISO 27001 and ISO 22301 standards. Let us carry out your first ISMS implementation!

Our audits are suitable for different types of organizations. Whether you are a public body, health institution, or company of any size, you will benefit from our services!
Explore more
ochrona danych - iod

Data Protection Officer

Our team consists of experienced lawyers, competent auditors, and the best penetration testers - this is confirmed by the certificates they hold.

We provide comprehensive services from the legal and technical side

- We protect against data leakage.
- We settle accounts following GDPR.
- We implement international protection under GDPR.
- We train effectively and practically.
- We conduct security audits.
- We identify risks and implement tools to minimize the effects of their occurrence.
- We determine the reasons for violations.
- We estimate the budget in terms of GDPR.
The service is addressed to entities for whom outsourcing tasks related to GDPR is simply more cost-effective.
Explore more
cyberbezpieczeństwo - vciso

Virtual Chief Information Security Officer (vCISO)

A team of professionals is an unprecedented advantage over any, even the best, security chief.

Suitable for organizations of all sizes that want to build from scratch and/or improve security. If you don't feel confident in the area of security or you know that you need support, then the vCISO service will be very beneficial for you.

The usual scope of service includes:

- Advising on the selection of protective measures.
- Supporting the development of security architecture.
- Close cooperation with the Data Protection Officer.
- Close cooperation with the technical director (CTO) / Chief Information Officer (CIO).
- Social Engineering Tests.
- Regular scans for known vulnerabilities with a report and recommendations for changes.
- Supporting the development process of documentation procedures and instructions.
- Cybersecurity training.
Explore more
cyberbezpieczeństwo - siem

Security Information Event Management (SIEM) Implementation

We implement SIEM systems and provide maintenance of the Security Operations Center (SOC).

As a result of the automated operation of SIEM, administrators no longer have to review logs manually. They receive processed information about threats and an estimate of the risk associated with detected anomalies.

SIEM functions:

- Data aggregation.
- Data correlation.
- Sending notifications.
- Event monitoring.
- Indefinite data storage.
SIEM provides analysts with the ability to take quick action, without undue delay, in the event of a threat or anomaly.
Explore more
cyberbezpieczeństwo - DORA

Ready for DORA

Prepare your company for the requirements of the Digital Operational Resilience Regulation for the financial services sector (DORA).

We use red team techniques to analyze threats to the constantly operating critical production systems of financial entities.

We test:
- ICT tools and systems.
- ICT tools, systems, and processes by conducting penetration tests to search for threats (TLPT - Thread-Led Penetration Testing).

After the tests, we provide a report summarizing the obtained results and describing the risk management process, indicating the proposed remedial actions. The process must be repeated at least once a year, or after a key update or change in the system.

We also conduct:

- Advisory on ICT strategies, policies, procedures, protocols, and tools necessary to ensure proper and adequate protection - updated at least once a year.
- Development of an ICT incident management process - periodic tests.
- Analysis of ICT-related incidents, after they occur, risk assessment, and planning of remedial actions.
- Employee Cybersecurity Training regarding gathering information on vulnerabilities and cyber threats, ICT-related incidents, in particular cyberattacks, and analysis of their likely impact on digital operational resilience.
Explore more
cyberbezpieczeństwo - cynet

Cynet - Cybersecurity Platform

All the protections you need included in one easy-to-use platform.

Cynet automatically prevents, detects, and neutralizes threats, significantly relieving your organization of the burden of continuous threat monitoring.

Cynet features:

- Extended Detection and Response (XDR).
- Endpoint Detection and Response (EDR).
- Network Detection and Response (NDR).
- Endpoint Protection (EPP).
- Domain Filtering.
- Managed Detection and Response (MDR).
- Security Orchestration, Automation and Response (SOAR).
- Cloud Security Posture Management (CSPM).
- Central Log Management.
- SaaS Security Postrure Management (SSPM).
- Mobile Threat Defence (MTD).
- User Behavior Analytics (UBA).
- Deception.
- Port Scanning.
Choose affordable, comprehensive protection!
Explore more
cyberbezpieczeństwo - logsign

Logsign

This comprehensive solution will help you increase your organization’s cyber resilience by supporting smooth operations, seamless deployments, fast and timely detection, and effective response. With an intuitive interface, Logsign simplifies the entire process, ensuring a seamless experience for your teams.

Logsign features:

- Security Information and Event Management (SIEM).
- Threat Intelligence (TI).
- User and Entity Behavior (UEBA).
- Automated Incident Detection, Investigation and Response (TDIR).
Streamline cybersecurity operations at scale with an integrated platform.
Explore more

Wondering what will be best for your organization?

Contact Us!
 - we'll help.
Cybersecurity and data protection.
Penetration, social engineering and performance tests. Security audits and trainings. 
Authorized OffSec partner in Poland.
© 2024 efigo.pl

Stay safe with us.
+48 504 112 162
+48 512 669 907
Efigo Sp. z o.o.
ul. Mikołaja Kopernika 8/6
40-064 Katowice
POLAND

VAT No: PL9542760427
en_GBEN