SERVICES

We are COMPUTER 2000. A team of young professionals, providing complex turnkey IT solutions for cybersecurity, monitoring and management of networks and environments.

Because we don’t make any compromise with the quality that we offer to our customers, we choose to work with some of the best IT experts in Bulgaria and worldwide. Together with our partners, as part of our close cooperation, we can provide a wide variety of different services, ranging from implementation and fine-tuning to consultancy, compliance and specific procedures.

Implementation Services and Finetuning

 

Our team of experienced and competitive specialists are available for you. See it as a support and use this resource to solve complex problems, solution design and implementation.

Click to Read More

Our team of experienced and competitive specialists are available for you. See it as a support and use this resource to solve complex problems, solution design and implementation.

We work on a methodology that consists of the following phases:

  • Analysis: Deep analysis of the existing environment
  • Design: A design that is created from the manufacturer and our team best practice
  • Deployment: Deployment methodology ensures a uniform and well-documented operating environment
  • Operation: Operation methodology and education at all levels
  • Finetuning: Finetuning of specific operations and policies according to customer needs at every level

Automated Penetration Testing

 

Most organizations utilize security testing (a.k.a penetration testing) to validate the security posture of their network and systems. In such a test, security testers take on the role of a hacker.

Click to Read More

In such a test, security testers take on the role of a hacker and try to break into the organization’s IT environment to find vulnerabilities and determine how they exploit a real-world hacker attack. The underlying idea is that a good security test should reveal how an attacker could infiltrate an organization’s systems before it happens. Proper penetration testing helps organizations address issues in a more manageable and cost-effective manner.

However, attackers are always developing new exploits and attack methods, often using machine learning (ML) to launch attacks automatically. Enterprises’ security teams and professional “penetration testers” are under tremendous pressure to keep up.

Our Automated Penetration Testing service assists security testers in overcoming knowledge and experience limitations and always performs at a consistent top-level. The shift from manual-based, labor-intensive testing to machine-assisted automation alleviates the current severe shortage of security professionals. It allows human security experts to let go of daily labor-intensive work and devote more energy to the research of new threats and new technologies.

Our service automates the entire ethical hacking process. When it connects to an organization’s IT environment, it automatically discovers all different types of assets on the network and then utilizes the collective knowledge database of vulnerabilities to mine the target system. Once vulnerabilities are identified, it uses built-in hacking techniques and exploits libraries to launch an actual ethical attack against the vulnerability. If successful, the vulnerability is validated, and the entire kill-chain transaction is documented.

Automated Penetration Testing provides rich analytics for risk assessment and prioritization, exporting a comprehensive report with remediation advice, giving tools for patch verification.

Compromise Assessment

 

The Compromise Assessment services offer forensic analysis, carried out remotely and in an automated way, saving time and costs.

Click to Read More

As such, for the first time, Compromise Assessments can be offered in the SMB marketplace.

We are the first link in the chain of a Cybersecurity Professional. Starting with a Compromise Assessment, then SIEM, Vulnerability Test, Pen Test and Incident Response. Our services are the baseline for these tests as we are like a health check for the network, we show has a breach occurred, is there someone already inside the perimeter, what activities they’re doing, how long they’ve been there, etc. Compromise Assessment sets the scene for other responses to be carried out and show behaviors that other “real-time” solutions, AV’s or Firewalls will miss.

Compromise Assessment services can be used in a Proactive way, by performing good due diligence with regular Assessments and in a Reactive way to identify the breach, counter it before it becomes a serious issue for the company and even help with chain of custody, 3rd party suppliers and others.

However, attackers are always developing new exploits and attack methods, often using machine learning (ML) to launch attacks automatically. Enterprises’ security teams and professional “penetration testers” are under tremendous pressure to keep up.

Our Automated Penetration Testing service assists security testers in overcoming knowledge and experience limitations and always performs at a consistent top-level. The shift from manual-based, labor-intensive testing to machine-assisted automation alleviates the current severe shortage of security professionals. It allows human security experts to let go of daily labor-intensive work and devote more energy to the research of new threats and new technologies.

Our service automates the entire ethical hacking process. When it connects to an organization’s IT environment, it automatically discovers all different types of assets on the network and then utilizes the collective knowledge database of vulnerabilities to mine the target system. Once vulnerabilities are identified, it uses built-in hacking techniques and exploits libraries to launch an actual ethical attack against the vulnerability. If successful, the vulnerability is validated, and the entire kill-chain transaction is documented.

Automated Penetration Testing provides rich analytics for risk assessment and prioritization, exporting a comprehensive report with remediation advice, giving tools for patch verification.

Incident Response Post-breach

 

Incident Response Post-breach services help you to investigate, contain and remediate critical security incidents with speed, scale and efficiency.

Click to Read More

We provide services from experts, that have been at the forefront of cyber security and cyber threat intelligence. Our incident responders have been on the frontlines of the most complex breaches worldwide. They have a deep understanding of both existing and emerging threat actors, as well as their rapidly changing tactics, techniques and procedures.

Incident Response Post-breach services combine investigative and remediation expertise gained by responding to thousands of incidents with industry-leading threat intelligence and cutting edge network and endpoint technology.

The work on the largest and most publicized incidents uniquely qualifies our experts to assist clients with all aspects of an incident response—from technical response to crisis management. We help clients investigate and remediate faster and more efficiently, so they can get back to what matters most—their business.

The services include host-, network- and event-based analyses for a comprehensive, holistic assessment of the environment. Our response actions are tailored to help clients respond to and recover from an incident, while managing regulatory requirements and reputational damage.

During investigations, our consultants typically identify:

  • Affected applications, networks, systems and user accounts
  • Malicious software and exploited vulnerabilities
  • Information accessed or stolen

Software Asset Management

 

We are delivering a Software Asset Management (SAM) service that is designed to provide customers with a clear overview of their software environment and licensing models in order to help them make wise decisions in the future.

Click to Read More

The Software Asset Management service can be provided both as a one-time basic review service, as well as continuous advanced optimization service.

The basic service works best for organizations that:

  • Are clueless about their software
  • Aim to avoid software non-compliance and security risks
  • Are expecting changes in their IT environment
  • Are looking to cut costs
  • Are expecting an audit

The basic service is a one-time project with a duration of 2-3 months. Service reviews deployed software along with corresponding license documentation within your company. We also analyze your software usage habits to gain full insight into your software environment: what works for you, what does not, and what we could do to achieve the best ROI.

The advanced service works best for organizations that:

  • Expects license audit from vendors
  • Feels concerned about overpaying for licenses
  • Has license agreements with large vendors
  • Worries about software security
  • Plans to implement cloud strategy
  • Follows IT industry standards
  • Has no idea what SAM is

With the advanced SAM service you’ll receive a cloud-based SAM solution and ongoing advisory for right-sizing your software, cutting unnecessary costs and reducing potential risks.  The service starts with Transition Project (3 months) execution. During this we provide the technical implementation and system configuration, license collection, user training, system customization, SAM process assessment and consultancy. After Transition Project execution, you will receive always available WEB user portal, user & technical support with SLA, data updates and management works, quarterly executive reporting with presentation of findings and recommendations.

The advanced SAM service helps you to:

  • Monitor and retrieve data on the technology and software used in the enterprise, monitor whether and to what extent it is used.
  • Prepare for your next license purchase by making a smart choice without buying anything unnecessary.
  • Analyze and forecast IT and software budgets and monitor current costs. With our service, you can find optimization opportunities and save up to 30% on license costs in the first year.
  • Increase work efficiency by analyzing what applications and how often are used by the employee.
  • Evaluate the compliance of the programs used with the licenses you have purchased, thus protecting yourself from unnecessary risks.

We work on a methodology that consists of the following phases:

  • Analysis: Deep analysis of the existing environment
  • Design: A design that is created from the manufacturer and our team best practice
  • Deployment: Deployment methodology ensures a uniform and well-documented operating environment
  • Operation: Operation methodology and education at all levels
  • Finetuning: Finetuning of specific operations and policies according to customer needs at every level

Consultancy Services

 

Cyber Security Consulting – Outmaneuver your attackers with cyber security consulting and mdr services.

Click to Read More

Our consulting services provide industry-leading incident response, assessment, transformation, managed detection and response, and training services with hands-on tactical support. Our services help organizations effectively detect and respond to threats and reduce overall impact of business risk – before, during and after an incident. Our team of experts provide pragmatic recommendations to improve your processes, technologies and overall security posture before cyber threats disrupt your business operations and become headline breaches.

We will help you answer the following questions:

Is there an attacker in my network?

  • Compromise Assessment
  • Insider Threat Program Assessment

Am I prepared to respond?

  • Red Team Assessment
  • Purple Team Assessments
  • Response Readiness Assessment
  • Tabletop Exercise

How effective is my security?

  • Cloud Assessments
  • Security Program Assessment
  • Penetration Testing
  • Remote Security Assessment
  • Ransomware Defense Assessment
  • Industrial Controls Healthcheck
  • Active Directory Security Assessment
  • Cyber Risk Management Services
  • Cyber Insurance Risk Assessment
  • Mergers & Acquisitions Risk Assessment
  • Embedded Device Assessment

Educational services

 

We provide a wide variety of trainings and certification programs to enhance yours and your team abilities in deploying and operating our solutions and also handling day-to-day tasks regarding cybersecurity and IT management

Click to Read More

We believe that the combination between theory and practice is vital for the successful delivery of our services and maximize the value for our customers. Therefore, our trainers combine knowledge and certifications with strong implementation experience. ITIL, DevOps, Agile, COBIT, Project Management, Business Analysis, TOGAF, and Kepner-Tregoe trainings form the main part of our portfolio, in addition to information security and technology courses.

Security Awareness Training

 

No matter how large or small a business is, it’s a target for cybercriminals. That’s because it only takes a single unwitting click on a phishing link to grant criminals access to everything on a given network and, in some cases, beyond.

Click to Read More

It’s also why security awareness training and phishing simulations are essential for businesses who want to transform end users from the weakest link in the security chain, into a truly resilient first line of cyber defense.

Security Awareness Training provides the continuous, relevant, and measurable testing and education businesses need to minimize risky user behaviors and resulting security incidents and achieve cyber resilience.

Security Awareness Training is a fully cloud-based software-as-a-service (SaaS) offering. Admins can manage training and phishing simulations via the same console, providing a single-pane-of-glass experience with low management overhead.

There are 65+ Training Courses available, including the following (plus many more):

Featured Cybersecurity Courses

  • Understanding Cybersecurity
  • Understanding Malware
  • Understanding Phishing
  • Working Safely and Securely
  • Avoid Phishers, Hackers, and Social Engineers

Topical Cybersecurity Courses

  • Social Media Awareness
  • Phishing Awareness
  • Websites and Software
  • Email
  • Passwords
  • Physical Access

Compliance Courses

  • PCI DSS
  • Data Protection
  • GDPR – Global Data Protection Regulation

• HIPAA Privacy and Security 101

Compliance Audit

 

We provide a variety of Compliance Audit services, in order for your company to be able to prove compliance with GDPR, ISO and other IT sector related regulatory certificates.

Click to Read More

GDPR

The General Data Protection Regulation (GDPR) is designed to significantly improve data protection for individuals in the EU and internationally by introducing new restrictions for organizations that process the data of EU residents.

Even though the GDPR came into force in May 2018, many organizations are not even close to complying with it. If you are among the many who are not yet familiar with its requirements, this Compliance Audit service is for you. It answers all the most frequently asked questions about the GDPR, so you can start taking practical steps to achieve and demonstrate compliance. Specifically, you will get answers to the following questions:

  • What is the GDPR?
  • What types of data does it protect?
  • What are its main requirements?
  • Which organizations are affected?
  • How are fines for non-compliance determined, and how large they are for specific violations?
  • What are the benefits of compliance?
  • How can you get your organization GDPR-ready?

Our services will guide you and assess whether you are compliant with the GDPR requirements.

ISO 27001

ISO/IEC 27001 is a set of international standards developed to guide information security. Its component standards, such as ISO/IEC 27001:2013, are designed to help organizations implement, maintain and continually improve an information security management system (ISMS).

In a world where hackers relentlessly target your data and more and data privacy mandates carry stiff penalties, following ISO standards will help you reduce risk, comply with legal requirements, lower your costs and achieve a competitive advantage. In short, ISO 27001 certification will help your business attract and retain customers.

Risk management is the central idea of ISO 27001: You must identify sensitive or valuable information that requires protection, determine the various ways that data could be at risk, and implement controls to mitigate each risk. Risk includes any threat to data confidentiality, integrity or availability. The standard provides a framework for choosing appropriate controls and processes.

In particular, ISO 27001 requires you to:

  • Identify stakeholders and their expectations of the ISMS
  • Define the scope of your ISMS
  • Define a security policy
  • Conduct a risk assessment to identify existing and potential data risks
  • Define controls and processes to manage those risks
  • Establish clear objectives for each information security initiative
  • Implement controls and other risk treatment methods
  • Measure and continuously improve the performance of the ISMS

Our services will guide you and assess whether you are compliant with the ISO 27001 requirements.

Server / Database Migration

 

The potential for downtime and data loss prevents many organizations from undertaking data migrations. Our migration services quickly and easily migrate physical, virtual and cloud workloads over any distance with minimal risk and near zero downtime.

Click to Read More

The streamlined process automates and consolidates numerous steps, which are otherwise manual and prone to human error, into just a few simple tasks, reducing the amount of work you need to do to reach your migration goals.

The service replicates the source system to the target, using AES 256-bit encryption to ensure security. Test cutovers can be performed anytime without impacting production systems. End users can continue working on the source system until the final cutover. The actual cutover takes just seconds or minutes.

The simplicity and repeatability of our migration services enables IT to switch platforms – including to, from and between public clouds like Amazon Web Services (AWS), Microsoft Azure and Google Cloud – without impacting system availability. It also frees IT from platform lock-in and allows you to be more agile and flexible with IT investments.

Next-Generation Monitoring

 

The services for Next-Generation Monitoring (NGM) collect and provide detailed actionable intelligence from a broad scope of vectors, including Infrastructure (System, Component, Network), Application and Database monitoring. 

Click to Read More

What exactly is Next-Generation Monitoring?

NGM is a silver bullet in terms of System Administration Automation processes, requires minimal intervention from a system administrator and provides Automatic Service Recovery functions.

NGM can apply to any service (Web, Email, Database, etc.) and applies to both on-premise and cloud infrastructures. NGM services are OS independent.

The main benefits of the NGM services are: reduction or optimization of support staff; improving the quality of services; reducing the risk of non-operating services; compliance with regulatory requirements.

Contact Us

Main: +359 2 439 2000

Information Security: +359 2 439 2009

software@computer2000.bg

63 Shipchenski Prohod Blvd, Sofia 1574, Bulgaria

Monday-Friday: 9am – 6pm

Send an Inquiry

Let’s walk through the journey of digital transformation together.