Skip to content
ABOUT US
OFFER
CAREER
CONTACT
SECURITY - SERVICES
Training courses
Data protected
ISO 27001
Backup
Tests
Social engineering tests
Network penetration tests
App pentesting
Audit
Server audit
TISAX audit
DORA audit
KSB315 audit
Network audit
Teleinformatics audit
Information Security audit
Implementation
Implementation of DORA Policies and Procedures
Implementation of NIS2 Policies and Procedures
DORA Implementation
TISAX Implementation
IDS/IPS implementation
SECURITY - SYSTEMS
Automation and Management
Service Automation
BAS | Breach and Attack Simulation
CEM | Critical Event Management
CTEM | Continuous Threat Exposure Management
RMM | Remote Monitoring and Management & Helpdesk
SIEM | Security Information and Event Management
SOAR | Security Orchestration, Automation, and Response
UEM/MDM | Unified Endpoint & Mobile Device Management
Vulnerability Management
Network Security
SSL/TLS Inspection
MFA (Multi-Factor Authentication)
NDR (Network Detection and Response)
DDoS Protection
SASE (Secure Access Service Edge)
SWG (Secure Web Gateway)
WAF (Web Application Firewall)
Service Security
CWPP (Cloud Workforce Protection Platform)
Offensive Security
E-Mail and Communication
Email Archiving
Email Security
Fax & Email Server
Network and Application Monitoring
ADC | Application Delivery Controller & Load Balancing
APM | Application Performance Monitoring
NAT | Network Address Translation
NPB | Network Packet Broker & TAP
NPM | Network Performance Monitoring
Data Protection
Backup and Data Recovery
DLP | Data Loss Prevention
Data Classification
MFT | Managed File Transfer
PAM | Privileged Access Management
SAT | Security Awareness Training
UBA | User Behavior Analytics
Device Protection
EDR | Endpoint Detection and Response
EPP | Endpoint Protection
MDR | Managed Detection & Response
XDR | eXtended Detection & Response
IT SERVICES FOR COMPANIES
IT helpdesk
Network management
Virtualization management
Windows & Linux management
IT Outsourcing - Comprehensive IT Support
NETWORKS
VPN
Firewall
Network implementation
IT IMPLEMENTATION
VoIP
Databases
IT monitoring
Virtualization
Active Directory implementation
Server implementation
File servers
Mail servers
WWW servers
HARDWARE & SOFTWARE
Hardware
Servers
Laptops
Monitors
Computers
Workstations
Disk Arrays
Computer networks
Software
ESET
Statlook
Baseline
Office 365
Essentials MDM
Polski
Facebook
Twitter
Linkedin
Instagram
Nothing Found
It seems we can’t find what you’re looking for. Perhaps searching can help.
Search for:
Close
Formularz
kontaktowy
Please enable JavaScript in your browser to complete this form.
Please enable JavaScript in your browser to complete this form.
Imię i nazwisko
*
Nazwa firmy
*
Numer telefonu
*
Adres e-mail
*
Wiadomość
Zgoda na przetwarzanie danych osobowych
*
Wyrażam zgodę na przetwarzanie danych osobowych przez Virtline Sp. z o.o. podanych w formularzu, w celu otrzymania oferty firmy Virtline Sp. z o.o. oraz materiałów marketingowych dotyczących produktów oraz usług świadczonych przez Virtline Sp. z o.o. Dane będą przetwarzane do czasu cofnięcia zgody. Masz prawo dostępu do danych, sprostowania, usunięcia lub ograniczenia przetwarzania, prawo sprzeciwu, prawo wniesienia skargi do organu nadzorczego lub przeniesienia danych poprzez wysłanie maila na adres admin@virtline.pl.
Wyślij wiadomość
×