We verify the risk level which the company is willing to accept in its business.

We assess the current state of security against cyber-attacks by identifying, analysing, evaluating and managing risks.

Analysis of the IS

We identify the state of cybersecurity in the organization and develop proposed measures based on the identified risks. We will evaluate the inventory of main and supporting assets for possible vulnerabilities and threats.

Based on the principle of multi-factor security, we will design a plan of measures for ensuring data availability, integrity and confidentiality.

Detail of the Service

  • Assessment of the asset and threat inventory
  • Vulnerability analysis of the company’s objectives, environment and risks
  • Consulting in the field of process and technical security enhancement of the organization
  • Preparation and implementation of cybersecurity audits

NIS2 Implementation

We will perform a differential analysis of the security state of a company or public administration organization and will train management, IT specialists and employees to comply with the NIS2 regulation requirements.

We will provide our customers with a real-time plan for the implementation of NIS2 with regard to required responsibilities, security of main and supporting assets, development of security policies and monitoring of the implementation, including the implementation of a cyber security audit.

Detail of the Service

  • Differential analysis of organisational and technical measures in accordance with the NIS2 regulation  requirements
  • Identification of conformity of the organisation’s processes and measures in the fields of Security Governance & Security Operations
  • Roadmap for implementation in your organization (from calibration of measures to budgeting)
  • Assistance on updating asset inventory and assets assessment (confidentiality, integrity, availability)
  • Vulnerability and risk assessment (GAP analysis, risk management plan, applicability statement)
  • Supplier risk management

Risk management

We will develop a comprehensive risk management plan for information systems in the context of security analyses performed to identify threats and vulnerabilities of the organization.

We evaluate the customer’s ICT security status against ISO 27000, ZKB, NIS2, COBIT, DORA, internal guidelines and other regulations.

Detail of the Service

  • Assets evaluating and scoring in terms of availability, integrity and confidentiality
  • GAP analysis
  • Design and update of recovery plans
  • Threat identification in relation to internal security policies
  • Design of risk management plan based on PDCA
  • Consulting in the area of process and technical security enhancement of the organization
  • Continuity plan of business activities
  • Preparing and follow-up performation of cyber security audits

Consulting and training

49% of companies in the Czech Republic are threatened by an immediate cyber-attack. Only 5% of data in domestic organisations is properly protected against attack, damage or theft. In the Czech Republic, a specific security problem is systems and application compromise due to inadequate vulnerability protection, where 84% of enterprises suffer from severe vulnerabilities at the outer perimeter. Human factors, employees and company management constitute a major security risk.

We focus on consulting and training in the field of cybersecurity and soft target protection. We perform tailor-made services in relation to customer needs, current legislative and legal requirements and registered threats.

Detail of the Service

Training courses and seminars covering educational areas

  • 4 key pillars of cyber resilience: SD WAN, in-depth network analysis, offline backups out of the reach of attackers, Anti DDoS protection
  • NIS2: costs and benefits of new cybersecurity responsibilities
  • Network Security Risk Management
  • Cybercrime on endpoint devices in organisations
  • Datacentre as the key tool for protecting data and operations
  • Converged security: the global trend of integrating corporate, public sector and enterprise protection services
  • Hacker communities, vulnerability scanning and penetration testing
  • Digital and physical security with simulations of hard-hitting attacks on property and health

„Faster CZ Cyber Security“ Professional certification

  • Training and certification of employees based on security and user roles
  • “Cyber Security Master” certification for organization management
  • Corporate Security Certification


  • Design and implementing vulnerability scans and penetration tests
  • ISMS and NIS2: implementation of technologies, processes and vendor relationship management
  • GAP Analysis and Risk Management
  • Design and implementing cybersecurity audits (SW, HW, IT/OT, SCADA)

Please do not hesitate to contact our Sales department for consultations and orders

+420 533 433 333


Projekt "Vybudování a provoz datového centra Faster CZ spol. s r.o.," (číslo CZ.01.4.04/0.0/0.0/15_011/0001405) je spolufinancován Evropskou unií v rámci Operačního programu Podnikání a inovace pro konkurenceschopnost (OP PIK). Na základě žádosti o podporu ze dne 30.7.2015 byl projekt uznán Ministerstvem financí jako způsobilý k poskytnutí dotace na výstavbu datového centra.

Zahájení projektu: 1.9.2015

Ukončení projektu: 31.12.2018

Realizace projektu: Jarní 1064/44g, Maloměřice, 614 00 Brno.

Cílem projektu je vybudování a provoz nového ekologicky šetrného datového centra, které zvýší konkurenceschopnost firmy a kvalitu poskytovaných služeb, vytvoří nová specializovaná pracovní místa a rozšíří spolupráci s brněnskými vysokými školami.

lin fb yt tw

Faster CZ spol. s r.o.
Jarní 1064/44g, 614 00 Brno
IČO: 60722266
DIČ: CZ60722266
Datová schránka: gyw5w8t
Číslo bank. účtu: 290204641/0300

Design by mevia.cz