Our Cybersecurity services are wide-ranging and rapidly evolving, just as security threats are.
We assist in all phases of security work, from analysis to implementation and operation.
-
Analysis: Vulnerability mapping, ransomware analysis, password hygiene, wireless networks, Active Directory, simulated phishing, etc.
-
Preparedness and incident management: Contingency plan, digital evidence, Security Operations Center, etc.
-
Governance and compliance: Information security management information system, GDPR compliance, risk assessments, etc.
Securing OT networks
Move has developed a security framework based on NSM's basic principles for ICT security, supplemented with additional controls from the NIST CSF framework. The framework is easy to use and ensures that companies have comprehensive management of both the IT environment and the OT environment. With the security framework, organizations can implement the necessary security controls to secure both environments.
Security as a Service
- Tailored service for your unique security needs
At a time when threats are becoming increasingly sophisticated, managing information security can be challenging. Many businesses have enough on their plate running their IT systems, and rarely enough capacity to manage information security. Move can offer your business a complete Security as a Service, designed to give you the peace of mind you need to focus on what you do best - running your business.
Secured private cloud
This description is relevant for anyone with sensitive information, critical systems or important production environments that need to be protected. These are typical issues related to systems and information that are critical to the company, society or that process sensitive personal data. The description is mainly aimed at secured environments that allow controlled connection to the outside world via commercial security products.
The solution design and tools are relevant for companies that are subject to regulatory conditions such as NIS2, Dora, the Security Act, GDPR, demanding sector and industry-specific security regulations and companies that operate with certifications according to standards such as ISO 27001 and ISA/IEC 62443.
