ABAKUS IT SOLUTIONS
Cybersecurity
Protect your data, ensure compliance and sustainably strengthen your company’s resilience.
Book a meeting Download a useful documentWe understand your challenges.
Whatever your IT requirements, we provide tailored solutions. Explore our areas of expertise.
We understand your challenges.
Whatever your IT requirements, we provide tailored solutions. Explore our areas of expertise.
Sustainably protect your business
Cybersecurity is no longer an option, but a necessity to ensure business continuity. In a context where threats are evolving rapidly and particularly affect SMEs, your company must be able to protect its data, meet regulatory requirements such as NIS2 and ensure strong security governance. Compliance, risk management and cyber maturity are becoming essential levers to preserve your organisation.
At ABAKUS IT-SOLUTIONS, we offer a comprehensive range of services tailored to your reality: NIS2, Cy-Fun or ISO 27001 audits, risk analysis, maturity assessments, penetration testing and vulnerability scans. Our pragmatic approach helps you identify weaknesses, prioritise actions and progressively and sustainably strengthen your security posture.
Whether it involves phishing, ransomware (cyberattacks involving ransom demands), account compromise or the exploitation of unpatched vulnerabilities, we work alongside you to build an effective and proportionate strategy.
We secure your systems, data and users through proven solutions: Fortinet firewalls, network segmentation, VPN, 3-2-1 backups, DLP, MFA, EDR/XDR, system patching, monitoring, response and recovery plans.
We complement this support with training and awareness programmes to strengthen the human factor.
With ABAKUS, you move forward with confidence: your information is protected, and your organisation is better prepared to face the growing sophistication of cyber threats.
Work with our cybersecurity team
Frédérick Georges
Partner – Administration & Control
Marc Cormann
Senior Security Engineer
Anthony Marpaux
Senior Security Engineer
Tim Kistemann
Security Engineer
Work with our cybersecurity team
Frédérick Georges
Partner – Administration & Control
Marc Cormann
Senior Security Engineer
Anthony Marpaux
Senior Security Engineer
Tim Kistemann
Security Engineer
5 service families dedicated to your security
A comprehensive approach covering all aspects of cybersecurity, from compliance to incident response.
Governance, risk and compliance
We support you in achieving compliance (NIS2, ISO 27001, Cy-Fun), conducting risk analysis and structuring your governance. You gain a clear view of your obligations and priority actions to strengthen your security.
Security assessment
We identify your vulnerabilities through penetration testing, Nessus scans and our ASM² maturity matrix. You receive a precise diagnosis to measure your exposure and prioritise the necessary remediation actions.
Protection (operational security)
We strengthen your infrastructure: firewalls, segmentation, identities, EDR/XDR, backups and DLP. Objective: reduce the attack surface and sustainably protect your systems and data.
Detection and response
We implement logging, monitoring, log correlation and response and recovery plans. You detect earlier, respond faster and improve your cyber-resilience against incidents.
Awareness and training
We develop your teams' cyber culture through simulated phishing, micro-learning and certified training. Your employees become a true first line of defence.
5 service families dedicated to your security
A comprehensive approach covering all aspects of cybersecurity, from compliance to incident response.
Governance, risk and compliance
We support you in achieving compliance (NIS2, ISO 27001, Cy-Fun), conducting risk analysis and structuring your governance. You gain a clear view of your obligations and priority actions to strengthen your security.
Security assessment
We identify your vulnerabilities through penetration testing, Nessus scans and our ASM² maturity matrix. You receive a precise diagnosis to measure your exposure and prioritise the necessary remediation actions.
Protection (operational security)
We strengthen your infrastructure: firewalls, segmentation, identities, EDR/XDR, backups and DLP. Objective: reduce the attack surface and sustainably protect your systems and data.
Detection and response
We implement logging, monitoring, log correlation and response and recovery plans. You detect earlier, respond faster and improve your cyber-resilience against incidents.
Awareness and training
We develop your teams' cyber culture through simulated phishing, micro-learning and certified training. Your employees become a true first line of defence.
They trusted us
Find out how we support our customers in increasing their cyber security maturity.
Eutomation – Cybersecurity maturity assessment
Support for an industrial SME using our ASM² matrix to obtain a clear view of their security posture.
New customer cases
New case studies will soon be available to illustrate our cybersecurity support.
They trusted us
Find out how we support our customers in increasing their cyber security maturity.
Eutomation – Cybersecurity maturity assessment
Support for an industrial SME using our ASM² matrix to obtain a clear view of their security posture.
New customer cases
New case studies will soon be available to illustrate our cybersecurity support.
Let's talk about your cybersecurity needs
Our experts are available to support you in your cybersecurity transformation.
Cybersecurity needs?
Our experts are available to support you with your compliance.
Book a meeting30 things to check in your company
The majority of cyberattacks affecting SMEs could be avoided with a few simple checks. This checklist allows you to quickly assess your security level.
Receive the checklistLet's talk about your cybersecurity needs
Our experts are available to support you in your cybersecurity transformation.
Cybersecurity needs?
Our experts are available to support you with your compliance.
Book a meeting30 things to check in your company
The majority of cyberattacks affecting SMEs could be avoided with a few simple checks. This checklist allows you to quickly assess your security level.
Receive the checklist
Cybersecurity needs?
Book a meeting