IT Management
Forensic Technology
Computer Forensics, e-Discovery & e-Disclosures, Forensic Data Analytics, Cyber Fraud & Hacking Investigations; We identify source of confidential information leakage, capture relevant data to support fraud, corruption, and compliance investigations, examine emails, documents and pictures for traces of manipulation, provide investigative and technical assistance in investigations and legal proceedings, including acting as independent experts.
Technology Advisory
Information Security Controls Assessment, Vulnerability Assessment and Penetration Test, Personal Data Protection Compliance, PCI-DSS Compliance Assessment, Software Asset Management, Licensing and Royalty Compliance; We manage cybercrime incidents, detect IP infringement and to minimize business risks. We can also help to optimize the return of investment in IT spent and build stronger IT capabilities, thus enhancing the overall business performance within the company.
Digital Information Extraction
Operational task of extracting structured information from unstructured and/or semi-structured machine-readable documents. In most of the cases this activity concerns portable content extraction.