Finder d.o.o.
  • IT Support & consulting
  • IT Security
  • Networks
  • Cloud Services
  • Purchase hardware & software
  • Software Development
Contact
Contact
|
HRVATSKI
HR

IT Security

Your IT Shield
IT system architecture resistant to cyber attacks
Active cyber protection of IT systems (firewall)
Ensuring business continuity
Data security and backup
Wireless communication security
NIS2 directive

IT system architecture resistant to cyber attacks


Our service of designing IT system architecture resistant to cyber attacks ensures maximum protection of your data, systems and business from increasingly complex threats in the digital environment. We create IT infrastructures blueprints to withstand, detect and quickly recover from potential attacks.

What the service includes

    • Risk analysis and assessment

      • Identification of key systems and potential security vulnerabilities.
      • Assessment of existing security mechanisms and their resilience to attacks.
      • Development of specific threat scenarios (e.g., ransomware, DDoS attacks, phishing).
    • IT architecture design

      • Development of security architecture based on best industry practices (e.g., Zero Trust, Defense-in-Depth).
      • Implementation of network segments with multiple layers of protection (firewall, IDS/IPS).
      • Setting up security zones for different parts of the system (DMZ, private networks).
    • Security tools and technologies

      • Integration of advanced protection tools such as endpoint protection, SIEM solutions and anomaly monitoring systems.
      • Implementation of data encryption at rest and during transmission.
      • Managing privileges and access using MFA (Multi-Factor Authentication) and IAM (Identity Access Management).
    • Recovery from attacks and Disaster Recovery

      • Developing recovery plans after incidents and ensuring business continuity (BCP).
      • Regular testing of backups and strategies for fast data recovery.
    • Monitoring and proactive defense

      • Setting up real-time monitoring systems to detect threats before they cause damage.
      • Conducting regular security audits and testing (penetration tests, attack simulations).
    • Training and user awareness

      • Training employees to recognize and respond to threats such as phishing and social engineering.
      • Introducing security policies for working with data and devices (e.g., BYOD security guidelines).

Benefits of our service

    • Risk reduction
      Proactive protection against the most common and dangerous threats.
    • Business continuity
      Minimization of downtime with reliable security measures.
    • Scalability
      Architecture tailored to your current and future needs.
    • Compliance with regulations
      Ensuring compliance with standards such as GDPR, ISO 27001 etc.

Who is the service intended for?
This service is ideal for companies and organizations of all sizes that want to improve their security and protect themselves from the growing threat of cyber attacks.
Contact us to build a resilient IT system that protects your business at all times!

Active cyber protection of IT systems (firewall)


Our active cyber protection service with next generaton firewall solutions provides constant, dynamic protection of your IT environment from threats and attacks. By implementing advanced application and threat detection firewall technologies, we protect your network and systems from unauthorized access, malware, DDoS attacks and other security threats in real-time.

What the service includes

    • Design and implementation of firewall solutions

      • Planning and implementing firewall systems based on the specific needs of your network.
      • Setting up network protections at the perimeter and within the internal network (internal and external firewalls).
      • Integration with other security systems such as IDS/IPS (Intrusion Detection/Prevention Systems) and SIEM (Security Information and Event Management).
    • Setting and configuring security rules

      • Defining access rules for applications, servers and network resources.
      • Creating granular rules to block unauthorized traffic and monitor suspicious activities.
      • Implementing traffic filtering based on IP addresses, ports, protocols and applications.
    • Real-time traffic monitoring and analysis

      • Continuous monitoring of network traffic and detection of anomalies that may indicate attacks or security threats.
      • Real-time analysis of logs and events to detect potential threats and enable timely responses.
    • Attack prevention and blocking

      • Detecting and blocking known threats such as DDoS attacks, phishing, brute force attempts and malware.
      • Protection from attacks at the application level, including SQL injection, XSS (Cross-Site Scripting) etc.
    • Regular updates and security upgrades

      • Updating firewall devices and software solutions to protect against new threats and vulnerabilities.
      • Implementing the latest security patches and features.
    • Reporting and threat analysis

      • Detailed reports on proactive and reactive security interventions.
      • Recommendations for further protection strengthening based on recorded threats and attacks.

Benefits of our service

    • Constant protection:
      Firewall solutions that provide 24/7 protection from all types of threats.
    • Quick response to threats:
      Monitoring and blocking suspicious traffic in real-time.
    • Risk reduction:
      Blocking unauthorized access and attacks before damage occurs.
    • Flexibility and customization:
      Firewall solutions that can be tailored to the specific needs of your organization.

Who is the service intended for?
This service is suitable for companies of all sizes that want to secure their IT system from external and internal threats and who want to have a safe, stable and reliable system to protect their data and resources.
Contact us and ensure continuous protection of your IT environment with advanced firewall technology!

Ensuring Business continuity


Our business continuity assurance service ensures that your organization continues operations seamlessly and restores critical business functions in the event of unforeseen events or cyber-attacks or other major system failures.

What the service includes

    • Business Risk Assessment and Analysis

      • Identification of critical business functions and resources essential for uninterrupted operations.
      • Analysis of threats that could jeopardize business continuity, including technical, natural and human risks.
      • Assessment of the potential impact of service disruptions on your business.
    • Development of a Business Continuity Plan (BCP)

      • Creation and implementation of a business continuity plan ensuring the rapid restoration of key functions.
      • Defining procedures for communication, emergency responses and returning to normal operations.
      • Preparing guidelines for managing resources in crisis situations (e.g., IT infrastructure, human resources).
    • Development of a Disaster Recovery Plan (DRP)

      • Establishing strategies for recovering IT systems and data after a cyber-attack, natural disasters or other accidents.
      • Implementing data backups and testing systems for quick restoration of functionality.
      • Tailoring plans to the specifics of your organization, including remote work and cloud solutions.
    • Implementation of Data Backup and Replication

      • Creating regular data backups and implementing replication to different locations to protect data from loss.
      • Testing and validating backups to ensure quick recovery in case of data loss.
    • Monitoring and Evaluating the Effectiveness of the Plan

      • Regularly testing the business continuity plan to ensure its effectiveness in real conditions.
      • Conducting disaster simulations (tabletop exercises) to prepare for various crisis scenarios.
      • Updating the plan based on new threats, technologies and business changes.
    • Employee Education and Training

      • Training employees on their roles in crisis situations and the implementation of the business continuity plan.
      • Raising awareness about security threats, data protection procedures and business resilience.

Benefits of Our Service

    • Seamless Operations
      We ensure minimal business interruption and quick recovery of critical functions in case of a crisis.
    • Increased Security
      We reduce the risk of significant data loss and business downtime through proactive protection.
    • Flexibility and Adaptation
      Plans are adaptable to your specific needs, size and industry.
    • Regulatory Compliance
      We ensure that your organization complies with regulatory requirements such as GDPR, ISO 22301 etc.

Who is this service for?
This service is suitable for all organizations looking to ensure business resilience, whether small businesses, large corporations or specialized industries (healthcare, finance, retail).
Contact us and ensure your business stability with a comprehensive business continuity and disaster recovery plan!

Data Security and Backup


Our data security and backup service provides comprehensive protection for your data against loss, unauthorized access and cyber threats. By implementing advanced security measures and regular backups, we ensure that your data is securely stored and your organization is protected from disasters such as hardware failures, human errors or cyber-attacks.

What the service includes

    • Data Security

      • Data encryption: Implementing strong encryption technologies to protect data at rest (on disk) and during transmission (over the network).
      • Access control: Establishing data access policies based on user roles and implementing multi-factor authentication (MFA) for additional security.
      • Malware protection: Installing antivirus, antimalware and anti-ransomware solutions to detect and block threats in real-time.
    • Data Backup

      • Regular backups: Creating backups of data on a daily, weekly, or monthly basis, depending on your needs and the type of data.
      • Offline and online backup solutions: Implementing data storage solutions in the cloud (cloud backup) as well as local backups (on-premise backup).
      • Automated backups: Implementing automated backup systems to avoid errors in the process and ensure regular backups without human intervention.
    • Backup Strategies

      • Incremental and differential backups: Using different backup methods to optimize storage space and data recovery speed.
      • Backup with long retention strategies: Developing a plan for long-term storage of backups, including archiving and legal data retention requirements.
      • Data recovery testing: Regularly testing backups and data recovery to ensure quick and efficient data restoration in case of loss or an attack.
    • Disaster Data Protection

      • Disaster recovery plan (DRP): Developing and implementing a plan for rapid data and system recovery in case of a disaster, such as data loss due to hardware failure, natural disasters, or cyber-attacks.
      • Data replication: Setting up a system for real-time data replication to multiple locations, including cloud backups and local data centers.
    • Compliance and Protection of Legal Data

      • Compliance with regulations: Ensuring compliance with laws and regulations related to data protection, such as GDPR, HIPAA and other industry standards.
      • Security for storing sensitive data: Implementing additional protection measures for sensitive information, including personal data and financial information.
    • Monitoring and Reporting

      • Backup monitoring: Continuous monitoring of backup status and timely detection of issues such as failed backups or storage problems.
      • Reports and analysis: Detailed reports on backup status and data security, including recommendations for improvements and optimization.

Benefits of Our Service

    • Data Security
      All data is protected with encryption and advanced security protocols.
    • Fast Recovery
      We ensure that you can quickly restore data and resume operations in case of data loss.
    • Compliance and Protection
      We ensure that your organization meets all regulatory requirements and data protection standards.
    • Increased Resilience
      Strengthen your business resilience to cyber threats and disasters with integrated backups and recovery plans.

Who is this service for?
This service is ideal for all organizations that want to ensure the security of their data and take proactive steps to protect against data loss and cyber threats, regardless of size or industry.
Contact us and ensure the security and integrity of your data with our reliable and secure backup service!

Wireless Communication Security


Our wireless communication security service ensures the protection of your wireless networks and devices from threats such as unauthorized access, data interception and cyberattacks. Given the increasing use of Wi-Fi networks in business, it is crucial to implement security measures that protect your wireless communication channels and prevent potential security vulnerabilities.

What the service includes

    • Secure Configuration of Wireless Networks

      • Setting up WPA3 encryption: Implementing the latest encryption protocols (WPA3) to protect data in transit and prevent communication interception.
      • Network segmentation: Separating internal business traffic from public networks (guest networks) and reducing the risk of unauthorized access.
      • Using Virtual Private Networks (VPN): Introducing VPNs for additional security when remotely accessing wireless networks.
    • Protection Against Unauthorized Access

      • Device and user authentication: Implementing advanced authentication methods such as MAC address filtering, certificates and multi-factor authentication (MFA) for wireless network access.
      • Access policies: Defining and applying security policies to control who, when and how can access the network.
      • Monitoring and detecting unauthorized devices: Implementing systems to monitor wireless traffic and detect devices attempting unauthorized access to the network.
    • Protection Against Threats and Attacks

      • Prevention of "Man-in-the-Middle" (MITM) attacks: Protection from attacks where attackers try to intercept and manipulate communication between devices and access points.
      • Protection against "Rogue" access points: Detection and blocking of fake access points that may try to deceive users and collect sensitive information.
      • Preventive protection against DoS and DDoS attacks: Implementing solutions to protect against attacks targeting the wireless network, reducing service availability.
    • Access Management and Data Encryption

      • Data encryption in transit: Ensuring that all data sent wirelessly is encrypted to prevent interception and unauthorized access.
      • Secure storage of keys and passwords: Implementing secure methods for storing passwords and authentication data to reduce the risk of compromise.
    • Monitoring and Reporting

      • Continuous monitoring of the wireless network: Monitoring traffic in real-time to detect suspicious activities, attacks and potential threats.
      • Reporting on security events: Detailed reports on security threats and attacks on the wireless network with recommendations for further strengthening security.
    • User Education

      • Employee training: Educating employees about security threats related to wireless networks and best practices for secure Wi-Fi usage (e.g., avoiding connecting to insecure networks, password management rules).
      • Wi-Fi usage policies: Developing security guidelines and policies for the use of wireless networks within the organization.

Benefits of Our Service

    • High Security of Wireless Networks
      Protection of data and devices from threats such as interception, unauthorized access and cyberattacks.
    • Proactive Threat Detection
      Real-time monitoring of the wireless network to detect and respond to potential threats.
    • Increased Resilience to Attacks
      Implementing security measures that minimize the likelihood of an attack succeeding on your network.
    • Easy Integration and Management
      Solutions that are easily integrated into the existing infrastructure and enable simple management and monitoring.

Who is the service intended for?
This service is ideal for companies and organizations that use wireless networks for business and want to ensure a secure and reliable wireless environment for their employees and users.
Contact us to ensure that your wireless communication is secure, reliable and protected from threats!

NIS2 Directive


The NIS2 Directive (EU Directive on the Security of Network and Information Systems) is an important framework for enhancing cybersecurity within the European Union. This directive aims to strengthen the security of critical infrastructure sectors and increase resilience against cyber threats and attacks. Our service under the NIS2 Directive helps organizations implement necessary measures and procedures that ensure compliance with regulations and protection from increasingly sophisticated cyber threats.

What the service includes

    • Compliance Analysis with NIS2 Directive

      • Detailed analysis of your organization in relation to the NIS2 Directive requirements.
      • Assessment of existing security policies, procedures and infrastructure.
      • Identification of critical infrastructures and services that must comply with the directive.
    • Creating a Compliance Plan

      • Developing a plan to implement security measures according to NIS2 requirements.
      • Defining responsibilities and procedures for implementing security policies, data protection and cyber threat prevention.
      • Developing a strategy for employee training and raising awareness about cybersecurity.
    • Compliance with NIS2 Technical Requirements

      • Implementing technical solutions to strengthen network and information system security.
      • Developing security infrastructures, including firewall protection, intrusion prevention systems (IPS), data encryption and backups.
      • Ensuring supply chain security and managing risks from third parties.
    • Incident Management and Reporting

      • Implementing systems for timely detection and reporting of security incidents.
      • Developing procedures for incident management, notifying competent authorities and establishing incident response teams (CERT).
      • Ensuring all security incidents are documented and analyzed according to NIS2 requirements.
    • Continuous Monitoring and Security Improvement

      • Proactively monitoring security threats and taking action to prevent attacks.
      • Regular updates and evaluation of security policies and measures in line with new threats and regulations.
      • Testing system resilience through attack simulations and crisis management exercises.
    • Reporting and Documentation

      • Creating necessary documentation to prove compliance with the NIS2 Directive.
      • Preparing reports for authorities in accordance with legal obligations.
      • Providing support during inspections or audits by regulatory bodies.

Benefits of Our Service:

    • Focus on Compliance
      Our service ensures your organization is fully compliant with the NIS2 Directive, reducing legal risks.
    • Increased Security
      By implementing advanced security measures, we protect your organization from cyber threats and attacks.
    • Reduced Operational Risks
      By introducing security procedures, we reduce potential damage caused by security incidents.
    • Proactive Protection
      Our solutions enable proactive threat detection and quick response, minimizing downtime and data loss.

Who is the service intended for?
This service is intended for all organizations within the European Union that provide services or manage critical infrastructure sectors essential for the economy, healthcare, energy, transport, finance and other critical industries. It is also relevant for any entity that wishes to strengthen its cybersecurity and comply with the latest European legislation.
Contact us to ensure your organization is fully compliant with the NIS2 Directive and protected from modern cyber threats!


Božidarevićeva 13, Zagreb
+385 1 2337 731
prodaja@finder.hr
  • IT Support & consulting
    (your dedicated IT department)
  • Design and Optimization of IT Systems
  • Computer and Peripheral Equipment Installation
  • Computer Maintenance (PC and Apple)
  • User Support for Hardware and Software
  • Installation and Maintenance of Windows and Linux Servers
  • Inspection, Upgrade, and Servicing of IT Equipment
  • Remote Access Interventions
  • On-Site Interventions
  • Helpdesk
  • IT Security
    (your IT shield)
  • IT system architecture resistant to cyber attacks
  • Active cyber protection of IT systems (firewall)
  • Ensuring business continuity
  • Data security and backup
  • Wireless communication security
  • NIS2 directive
  • Networks
    (your connectivity)
  • Netwok design and planning
  • Maintenance of active network equipment
  • Maintenance of telecom infrastructure
  • Virtual Private Networks (VPN)
  • Network segmentation (VLAN)
  • Remote office / branch connections (Site-to-Site VPN)
  • Integration of mobile devices into business processes
  • Cloud Services
    (your unlimited possibilities)
  • Server Virtualization (VPS)
  • Web Hosting
  • Hosting and Maintenance of Mail Servers
  • Hosting and Maintenance of Web Servers
  • Cloud Backup
  • Microsoft 365
  • Zoom Workplace
Purchase hardware & software| Software Development| Facebook| Instagram| LinkedIN| Twitter/X
Creation and Maintenance Finder d.o.o. 1994- © All rights reserved - Cookies settings - Hrvatski