Privacy Policy

 

Privacy Policy


Effective date: July 27, 2018.

ISCG Ltd. ("we", "us", "our") operates the website https://www.iscg.pl (the "Service"). This page informs you of our policies regarding the collection, use and disclosure of personal information when you use our Service and the options available to you related to that information.

 

We use your information to provide and improve the Service. By using the Service, you consent to the collection and use of information in accordance with this Privacy Policy. Unless otherwise defined in this Privacy Policy, terms used herein have the same meaning as in our Terms of Service, available at https://www.iscg.pl.


Definitions

  • Service
    The service is a website
    https://www.iscg.pl hosted by ISCG Ltd.
  • Personal information
    Personal information is information about a living person who can be identified from that information (or from that information in conjunction with other data in our possession or likely to come into our possession).
  • Data on the use of the Service (Usage Data).
    Data about the use of the Service is data collected automatically, produced by the use of the Service or by the infrastructure of the Service itself (for example, the duration of a visit to the site).
  • Cookies
    Cookies are small pieces of data stored on your device (computer or mobile device).
  • Data Administrator
    A Data Controller is an individual or legal entity that (alone or jointly with others) determines the purposes and means of processing Personal Data. For the purposes of this Privacy Policy, we are the Data Controller of your Personal Data.
  • Data Processors (or Service Providers).
    A Data Processor (or Service Provider) is any natural or legal person that processes data on behalf of the Data Controller.
    We may use various Service Providers to process your data more efficiently.
  • Data Subject (or User)
    A Data Subject is any living individual who uses our Service and is the subject of Personal Data.

Gathering and using information

We collect different types of information for different purposes to provide and improve our Service.


Types of data collected

Personal information

When using our Service, we may ask you to provide certain personal information that may be used to contact you or to identify you ("Personal Information"). Personal Information may include, but is not limited to:

  • E-mail address
  • Name
  • Phone number
  • Cookies and Data about the use of the Service

Data on the use of the Service (Usage Data).

We may also collect information about how you access and use the Service ("Service Usage Data"). This data may include information such as your computer's Internet protocol address (e.g., IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers, and other diagnostic data.

Tracking data and cookies

We use cookies and similar tracking technologies to monitor activity on our Service and store certain information. Cookies are files containing a small amount of data that can contain an anonymous unique identifier. Cookies are sent to your

browser from the website and stored on your device. The tracking technologies used are also beacons, tags and scripts used to collect and track information and improve and analyze our Service.

You can set your browser to reject all cookies or to indicate that cookies are being sent. However, if you reject cookies, some parts of our Service may not be available.

Examples of the cookies we use:

  • Session cookies.We use session cookies to operate our Service.
  • Preference Cookies. We use preference cookies to remember your preferences and various settings.
  • Security cookies. We use security cookies for protective purposes.

Use of data

ISCG Ltd. uses the collected data for various purposes:

  • Providing and maintaining our Service
  • Notification of changes to our Service
  • Allowing you to participate in interactive features of our Service, if you wish to do so
  • Providing customer support
  • Gathering analysis or valuable information to improve our Service
  • Monitoring the use of our Service
  • Detection, prevention and resolution of technical problems

Legal basis for the processing of Personal Data under the GDPR (General Data Protection Regulation)

If you are from the European Economic Area (EEA), ISCG Sp. z o.o.'s legal basis for collecting and using the Personal Information described in this Privacy Policy depends on the Personal Information we collect and the specific context in which we collect it.

ISCG Ltd. may process your Personal Data because:

  • We have to perform the contract concluded with you
  • You have given us permission to do so
  • Processing is in our legitimate interests and does not override your rights
  • To meet the legal requirements

Data retention period

ISCG Ltd. will retain your Personal Information only for as long as necessary for the purposes set forth in this Policy
Privacy. We will retain and use your Personal Information to the extent necessary to comply with our legal obligations (e.g., if we are required to retain your information under applicable law), resolve disputes, and enforce our agreements and policies. ISCG Ltd. will also store Data about the use of the Service for the purpose of internal analysis. Data on the use of the Service is usually stored for a shorter period, unless they are used to strengthen security or improve the functionality of our Service, or we are legally obligated to do so longer storage.

 

Data transfer

Your information, including Personal Information, may be transferred to and stored on computers located outside your state, province,
country or other governmental jurisdiction where data protection laws may differ from those in your jurisdiction.

If you are outside of Poland and choose to provide us with information, please note that we transfer data, including Personal Data, to Poland and process it there. Your consent to this Privacy Policy, then Sending such information, implies acceptance of this transfer.

ISCG Ltd. will take all reasonable steps to ensure that your data is handled securely and in accordance with this Policy
privacy, and no transfer of your Personal Information will occur to an organization or country where appropriate controls, including the security of your data and other personal information, are not provided.


Data disclosure

Business transactions

In the event of a merger, acquisition or sale of assets by ISCG Ltd. your Personal Information may be transferred. We will inform you of this before your Personal Information is transferred and becomes subject to a different Privacy Policy.

Disclosure of data to law enforcement agencies

Under certain circumstances, ISCG Ltd. may be required to disclose your Personal Information if required to do so by law or in
to respond to important requests from public authorities (e.g., a court or a government agency).

Legal requirements

ISCG Ltd. may disclose your Personal Information in good faith if necessary to:

  • Meet legal requirements
  • Execution of the provisions of the agreement
  • To protect and defend the rights of ISCG Ltd.
  • Prevent or investigate potential irregularities related to the Service
  • Protecting the personal safety of users of the Service or the public
  • Protection from legal liability

Data security

The security of your information is important to us, but remember that no method of transmission over the Internet or method of electronic storage is secure at 100%. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.


"Do Not Track" signals under the California Online Privacy Protection Act
(CalOPPA)

We do not support "Do Not Track" ("DNT"). "Do Not Track" is a preference you can set in your web browser to
inform the parties that you do not want to be tracked. You can enable or disable the "Do Not Track" feature in the Preferences or Settings section of your

web browser.


Your data protection rights under the GDPR (General Data Protection Regulation)

If you are a resident of the European Economic Area (EEA), you have certain data protection rights. ISCG Ltd. seeks to
take reasonable steps to allow you to correct, modify, delete or limit the use of your Personal Data.

If you want information about what Personal Information we have about you, or you want it removed from our systems,
CONTACT US. Under certain circumstances you are entitled to The following data protection rights: 

- Right to access, update or delete information we have about you. 

If possible, you can get Access, update or request deletion of your Personal Data directly In the account settings section. If you are unable to follow these steps yourself, contact us so we can help you. 

- Right of rectification. 

You have the right to correct your information if it is inaccurate or incomplete. 

- Right to object. 

You have the right to object to our processing of your Personal Data. 

- The right to restrict.
You have the right to request restrictions on the processing of your personal data. 

- Right to data portability. 

You have the right to receive a copy of the information we hold in a structured, commonly used and machine-readable format
Format. 

- Right to withdraw consent. 

You also have the right to withdraw your consent at any time if ISCG Ltd. relied on your consent to
personal data processing. Remember that we can ask you to Confirm your identity before responding to such requests.

You have the right to file a complaint with a data protection authority regarding our collection and use of your Personal Data. For more information, please contact your local data protection authority in the European Economic Area (EEA).


Service Providers

We may employ outside companies and individuals to facilitate the provision of our Service ("Service Providers"), to provide the Service in the
our behalf, to perform services related to the Service, or to assist us in analyzing the use of our Service. These third parties have access to

to your Personal Data only for the purpose of performing these tasks on our behalf and are required not to disclose it or use it for any other purpose.


Links to other sites

Our Service may contain links to other sites that are not operated by us. If you click on a third-party link, you will be redirected to that site. We recommend that you read the Privacy Policy of each site you visit. We have no control and do not bear responsibility for the content, privacy policies or practices of any Third-party sites or services.


Children's privacy

Our Service is not directed to persons under the age of 18 ("Children"). We do not knowingly collect personal information of individuals below

18 years of age. If you are a parent or guardian and you know that your Child has provided us with Personal Information, please contact us. If we find out that
we have collected Personal Information from children without verifying parental consent, we will take steps to remove this information from our servers.


Changes to this Privacy Policy

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.

We will notify you of the changes by email and/or by posting a prominent message on our Service before the changes take effect, as well as
we will update the "effective date" at the beginning of this Privacy Policy. We recommend reviewing this Policy periodically Privacy in terms of changes. The changes become effective upon publication On this page.


Contact

If you have any questions about this Privacy Policy, please contact us:

  • Via e-mail: biuro@iscg.pl
  • By mail: Aleje Jerozolimskie 178, 02-486 Warsaw, Poland

Business Applications

Migration of applications and processes

We carry out migration projects both at the level of data and entire processes. We specialize in migrations to the Microsoft ecosystem. We help plan migrations, prepare data for migration, and perform test and target migrations. We provide post-migration support and optimization services for new solutions.

Business Applications

Implementation of IT governance

We support our clients in implementing or optimizing IT governance for Microsoft solutions and technologies. We offer both in-house services developed on the basis of many years of experience and ready-made partner solutions to facilitate and accelerate the implementation of governance.

Business Applications

Implementation
and optimization of analytical solutions

We support our clients in building or optimizing analytics solutions. We provide services on all key layers of analytics, i.e. data extraction from various data sources, data integration and preparation for analytics, building optimized databases, warehouses and data lakes, and data modeling for analytics.

We help implement and adopt Microsoft solutions for analyzing and presenting data, such as Microsoft Fabric and Microsoft Power BI.

We organize workshops for both technical and business users.

Business Applications

Training for business and IT

We offer comprehensive training for companies on how to effectively use Microsoft 365 applications to help your team maximize the potential of modern office tools.

Our training courses are tailored to the participants' level of proficiency, and practical exercises will help to quickly implement the skills learned in everyday work.

We also offer specialized training for Microsoft 365 environment administrators to effectively manage and grow your company's infrastructure. Our training includes advanced configurations, security management, access control, application deployment and optimization of your Microsoft 365 environment.

With our experienced trainers, participants will gain hands-on knowledge of administering services such as Exchange Online, SharePoint, Teams, OneDrive and Azure AD, allowing them to effectively monitor and develop their cloud environment.

Cyber Security Technologies.

End device protection (EDR)

EDR (Endpoint Detection and Response). is an advanced cyber-security tool focused on monitoring and responding to threats in real time on end devices such as computers, smartphones and servers.

EDR uses behavioral analysis, signature engines and AI to detect and block attacks before they happen. Compared to traditional antivirus solutions, EDR offers more proactive protection and Automation of response processes.

It is a key tool that significantly improves the level of security in a customer's infrastructure, especially in the case of distributed infrastructure. It is also an essential tool in the work carried out by Security Operations Center (Monitoring Teams
and responding to cyber threats in the organization).

ISCG offers EDR-class systems of the world's leading cyber security vendors: Microsoft Defender for Endpoints, Checkpoint, Sentinel One, Trend Micro

Cyber Security Technologies.

Security incident monitoring and response [SIEM/SOAR].

Implementation of SIEM/SOAR monitoring and response systems [Security Information and Event Management/ Security Orchestration, Automation, and Response] offered by ISCG are advanced solutions that enable comprehensive protection of IT infrastructure. 

They integrate data from various sources such as network devices, operating systems, applications, EDR systems, PAM, IAM, and cloud environments, enabling continuous monitoring, threat detection and incident response automation. 

By combining SIEM and SOAR, organizations can quickly and effectively manage cyber security, minimizing the risk of attacks and ensuring regulatory compliance. These solutions are used in the daily work of the organization's security monitoring teams -. SOC (Security Operations Center)..

ISCG offers SIEM/SOAR class systems The world's leading cybersecurity vendors: Microsoft Sentinel, IBM Qradar, Elastic

Cyber Security Technologies.

Mobile Device Management [MDM].

MDM (Mobile Device Management). is a modern solution enabling central management of mobile devices in the company. Implementation of MDM class systems allows remote configuration, monitoring and security of mobile devices such as smartphones, tablets and employee laptops, providing full control over company data.

MDM Solutions protect against data loss or leakage, enable enforcement of security policies, and allow remote locking and wiping of devices In case of an emergency. They also allow the implementation of updates and patches which significantly contributes to the security of the infrastructure. This is a key element of security in remote and mobile work environments.

ISCG offers MDM-class systems The world's leading cyber security vendors: Microsoft Intune, Ivanti Trend Micro Mobile Security, NinjaOne

Cyber Security Technologies.

Web Application Security [WAF].

WAF (Web Application Firewall). is an advanced solution that protects web applications from external attacks, such as SQL injection, cross-site scripting (XSS), DDoS and other most frequently mentioned attacks listed in the OWASP Top 10

WAF Monitors and filters network traffic, providing protection against known and unknown threats before they reach your applications. With this tool, your applications are safe,
and user data protected. 

WAF is a key component of cybersecurity, making applications more resilient to attacks and ensuring compliance
With safety regulations and an absolute must have For an organization with web-based applications.

ISCG offers WAF-class systems The world's leading cybersecurity vendors: Microsoft Azure Application Gateway, Barracuda WAF

Cyber Security Technologies.

Email Security [Mail Security].

Mail Security provides comprehensive email protection against threats such as phishing, spam, malware and zero-day attacks. 

The solution monitors email traffic in real time, identifies suspicious messages and blocks dangerous content even before it reaches the mail server, minimizing the risk of data leakage and attacks on IT infrastructure. With advanced filtering and security mechanisms, it ensures secure company communications.

ISCG offers dedicated systems for mail protection The world's leading cybersecurity vendors: Microsoft Defender for Office 365, Trend Micro Email Security, Check Point Harmony Email & Collaboration

Cyber Security Technologies.

Enhanced Incident Detection and Response [XDR].

XDR (Extended Detection and Response) is an advanced solution that integrates threat data from different systems and layers of IT infrastructure, such as networks, endpoint devices and the cloud, to enable effective detection, analysis and response to attacks. XDR automates monitoring and incident response processes, which increases the efficiency of security operations. Unlike SIEM-class solutions, it features deeper analytics and automation of threat response processes. This solution helps companies proactively manage threats and reduce response times to cyber attacks, raising the level of protection for IT infrastructure.

ISCG offers XDR-class systems from the world's leading cyber security vendors: Microsoft Defender XDR , Checkpoint - Infinity XDR, SentinelOne - Singularity XDR, Trend Micro Vision One XDR

Cyber Security Technologies.

Multi-Factor Authentication [MFA].

MFA (Multi-Factor Authentication). offered by ISCG is multi-component authentication, which significantly increases the security level of access to digital resources.
MFA requires users to confirm their identity using two or more verification methods, such as SMS codes, biometrics or tokens.
The solution protects against unauthorized access, phishing attacks and ensures compliance with regulations such as RODO, NIS2 and DORA, which minimizes the risk of data breaches

ISCG offers MFA-class systems from the world's leading cybersecurity vendors: Microsoft Azure MFA, Yubico YubiKey, HID MFA, Delinea and ISCG's proprietary solution dedicated to on prem ASA2 MFA environments.

Cyber Security Technologies.

Passwordless authentication [Passwordless].

The Passwordless solution offered by ISCG is a passwordless authentication solution that eliminates the need for traditional passwords, increasing security and convenience for users. Identity verification is based on biometrics and cryptographic security keys, minimizing the risk of phishing attacks and data leaks. Passwordless authentication is more secure and intuitive, supporting organizations in eliminating weak passwords and improving productivity

ISCG offers Passwordless class systems from the world's leading cybersecurity vendors: Microsoft Azure Active Directory Passwordless. HID DigitalPersona, Yubico

Cyber Security Technologies.

Cloud security

Cloud security solutions [Cloud security]. offered by ISCG provides protection for data stored and processed in the cloud, minimizing the risk of cyber attacks and data leaks. The system includes mechanisms such as access control, preventive leakage protection and automated incident management. Through the collaboration of various cloud tools, ISCG provides comprehensive security tailored to an organization's needs, helping to meet regulatory and security standards

ISCG offers Cloud Security systems from the world's leading cyber security vendors: Microsoft Defender for Cloud. Trend Micro Cloud One

Cyber Security Services

Risk analysis and management

Risk analysis and management are key to ensuring the security of organizations, especially in the face of increasing regulatory requirements such as NIS2, DORA and RODO. By identifying and assessing risks, companies can minimize the risk of breaches, protect sensitive data and comply with applicable regulations. Implementing effective risk management mechanisms increases an organization's cyber resilience, allowing it to proactively counter threats and limit potential losses.

ISCG offers comprehensive cyber risk analysis and management services, helping organizations identify, assess and minimize IT security risks. Our best-practice-based solutions enable continuous monitoring of risks, implementation of effective security mechanisms and compliance with regulatory requirements.

Cyber Security Services

Vulnerability monitoring and management

Vulnerability monitoring and management service offered by ISCG is a service that provides comprehensive identification, assessment and management of vulnerabilities ( including patch management) in IT infrastructure. The goal of this process is to minimize the risks associated with cyber attacks through ongoing monitoring and security updates. This service includes regular scanning of resources, vulnerability assessment, patching and recommendations for future elimination or risk mitigation. In the price of the service, we provide commercial tools from leading manufacturers, so the organization does not incur any additional costs in terms of technology investment.

Benefits of vulnerability management:

  • Proactive detection of vulnerabilities in IT systems.
  • Increasing resilience to cyberattacks.
  • Maintain compliance with regulations and safety standards.
  • Respond faster and more effectively to new threats.
  • Monitoring the organization for vulnerabilities on a continuous basis
  • Patch management for third-party devices and systems and applications

Cyber Security Services

Security HealthCheck for AD

The scope of the service includes, but is not limited to.

  • Configuration audit - including domain structure, GPO policies, and user and group management
  • Security assessment - review of current security mechanisms, password policies, access control and login security features
  • Identification of risks - configuration errors, security weaknesses, improper configurations and permissions
  • Analysis of compliance with security standards
  • Remedial recommendations

The end product is a detailed technical report describing all detected vulnerabilities and configuration errors, along with clear recommendations for security departments to improve security and risk management.

We provide the SH service for AD(Entra) on a one-time basis or as a recurring service that is a regular item on the organization's audit schedule.

Cyber Security Services

Protecting the Cloud as a Service

ISCG provides services in the area of Cloud Security based on Microsoft technologies provide advanced protection for cloud environments based on solutions such as Microsoft Azure and Microsoft 365. Often this type of service begins the process that ultimately finalizes the implementation of a full Security Operations Center. These services include:

  1. Monitoring and detection of threats in cloud resources in real time, detect and automate actions to eliminate them
  2. Access and identity management Advanced identity management features, including Multi-Factor Authentication (MFA), Conditional Access, and Identity Protection, which provides full control over access to cloud resources.
  3. Data security and application protection - by monitoring and controlling application activities, implementing security policies tailored to the organization's needs and in compliance with regulations.

Cyber Security Services

Health Check Office 365

Office 365 Health Check is a service provided by ISCG, is a comprehensive analysis of the health of the Microsoft 365 environment. The audit includes verification of security, such as MFA implementation, license management and identification of unnecessary administrative privileges. Specialists also check security in services such as Azure Active Directory, Exchange Online, SharePoint, OneDrive and Teams. The goal is to optimize security and cost efficiency by eliminating unnecessary licenses and adjusting data protection policies.

What do you get?

  • Basic security verification (MFA, password policies)
  • Identification of accounts with unsafe privileges
  • Verification of phishing and spam policies
  • Microsoft expert advice

Areas tested:

  • Licenses
  • Microsoft 365 and Azure Active Directory Security
  • Exchange Online, SharePoint, Teams, OneDrive

Benefits:

  • Increasing security and eliminating unnecessary licenses, which reduces costs.

M365

End device management - Microsoft Intune

Endpoint device management is a key component of any organization's security strategy, and in the Microsoft 365 ecosystem, this is especially important. ISCG, a partner with Security expertise and years of experience in IT infrastructure management, offers end-to-end implementation and configuration of Microsoft Intune, a modern tool for managing mobile and desktop devices.

With Intune, it is possible to manage PCs and mobile devices from one central point, giving you full control over the devices in your company. This allows for effective:

  • configuration management,
  • Controlling and distributing updates,
  • Enforcing safeguards in accordance with the best industry standards,
  • Protection of corporate data on users' private devices (BYOD).

ISCG has been implementing endpoint device management solutions such as SCCM (System Center Configuration Manager) for years, making device management our DNA. This gives our customers the confidence that any Intune implementation will be based on a solid technical foundation and follow best practices. Our unique combination of knowledge and experience allows us to create consistent and secure IT environments.

Creating configuration and security standards is key to ensuring:

  • Uniformity and minimization of the risk of errors,
  • IT infrastructure scalability,
  • Full regulatory compliance (e.g., RODO),
  • Proactively securing company data against internal and external threats.

As part of the implementation, ISCG focuses on fine-tuning Intune to the organization's requirements. We integrate security solutions, such as Windows Defender, to effectively protect corporate data on users' devices, and support security policy management and compliance processes.

With ISCG as a partner, deploying Intune becomes the foundation for effective and secure endpoint device management, allowing the company to focus on key business objectives with the confidence that their IT environment is secure and optimized.

M365

Migrating documents to SharePoint and OneDrive

Moving documents from local file servers or other cloud-based solutions to platforms such as SharePoint and OneDrive is a key part of modernizing any company's IT environment. ISCG offers comprehensive migration services that not only include moving files, but also optimizing their organization and ensuring the highest level of security in the new environment. This allows companies not only to access data from anywhere and from any device, but also to manage information efficiently, securely.

Migrating files to SharePoint and OneDrive requires the use of precisely planned document transfer logic. It is important to preserve the file structure during the migration process and to properly map access to documents in the new environment. ISCG pays particular attention to securing access to data at various levels, from the site level to individual files. This allows organizations to effectively control who has access to certain information, which is essential for maintaining data security.

An important aspect of migration is the classification of documents, which enables the proper management of file confidentiality. For the migration of sensitive documents, ISCG ensures the implementation of advanced mechanisms to protect against data leakage. ISCG's experience in working with classified data (access level 3) is crucial here, as migration of such sensitive information requires not only technical competence, but also appropriate procedures to ensure data integrity and security.

The introduction of SharePoint and OneDrive also makes it possible to implement advanced auditing mechanisms to monitor user activity against specific files and sites. These technical safeguards not only protect data from unauthorized access, but also enable rapid response to potential security incidents. In the context of today's cyber threats, this approach to document management and migration is invaluable.

In summary, ISCG, with its experience and expertise, provides secure, efficient and best-practice file migration to SharePoint and OneDrive, which supports not only the flexibility of teamwork, but also the highest level of data protection in the company.

Azure

Maintain On-Premise and Azure environments 24/7

We provide professional maintenance services for Azure and On-premise environments, drawing on years of experience in managing large infrastructures for 50,000 users and several thousand servers. Our distinguishing feature is our support for classified networks and secret systems, thanks to our relevant certifications and NATO vendor status. We offer 24/7 global support and manage infrastructure in Data Centers around the world.

By opting for our services, you will focus on key aspects of your organization's operations, minimizing the risk of downtime and benefiting from advanced technologies and best practices. Outsourcing to ISCG also saves on hiring and training your own IT staff, allowing you to allocate resources more efficiently and invest in strategic growth.

Our comprehensive approach to infrastructure management, backed by experience in handling the most demanding environments, guarantees security, reliability and cost optimization. By working with us, you will gain confidence that your IT infrastructure is in the hands of experts who will ensure its uninterrupted availability and high performance.

Azure

Management and audit of directory services

For any organization, the correctness of directory services is crucial, ensuring consistency and security in the management of identities and access to IT resources.

We provide comprehensive 24-hour support services for Active Directory, covering 2-3 lines of support. With advanced knowledge and experience in the field of Identity and Access Management, our team of specialists provides the highest quality of services.

In addition, we perform Active Directory audits, both one-time and regular, which are key to maintaining optimal configuration and security. Our audits allow us to detect security vulnerabilities, check regulatory compliance and monitor system performance. With regular reviews, it is possible to react quickly to changes in the organizational and technological structure, which minimizes the risk of unauthorized access and ensures business continuity

Azure

Developing and maintaining standards in Azure

Customers often neglect regular reviews and audits of their cloud environment, leading to gaps in cloud management procedures and standards. ISCG ensures policies are updated and best practices are implemented, significantly improving security and efficiency.

We evaluate configurations and management policies on the Azure platform, identifying gaps, incompatibilities and risks. Based on the analysis, we develop recommendations for improving security, efficiency and compliance with best practices. We help implement these changes and monitor their effectiveness, regularly updating management policies.

Azure

Emergency recovery of cloud environment

We offer comprehensive preparation of backup environments for key IT systems, ensuring their continuity and security. Our offering includes risk analysis and estimation of the costs associated with failure, as well as the development of recovery procedures and identification of data sources. We use Azure Site Recovery, which is the most cost-effective solution in its class, offering low cost, automatic backups and fast restoration of systems. Our services also include the development of detailed restoration procedures, establishing service levels (SLAs), ongoing support and monitoring to minimize downtime and ensure a fully functional backup environment. With our offerings, you'll increase the security of your critical systems, benefit from the low cost of Azure Site Recovery, and gain the confidence of rapid system restoration and customization.

Azure

Migration to Azure

We specialize in comprehensive migration services to Azure, including both infrastructure and database applications. Our experienced teams of architects ensure a smooth and fast transfer of resources. The migration process is carried out with attention to data security and minimal downtime, allowing for a smooth transition to the new environment. Thanks to the advanced knowledge and experience of our specialists, clients can count on a safe and efficient migration that streamlines the management of IT resources and optimizes operating costs.

Business Applications

DMS and VDR system

We offer implementation of an advanced DMS (Document Management System) class system with VDR (Virtual Data Room) functionalities, based on Microsoft SharePoint platform.

Our solution allows you to centrally manage your records, providing full control over access, versioning and archiving of documents. With VDR functionality, we enable secure sharing of confidential data with external partners, while maintaining the highest standards of security and activity tracking.

The system supports full automation of workflow processes, and with its flexible configurations, it is ideally suited to the needs of your organization, ensuring regulatory compliance and operational efficiency

Infrastructure

Backup

We support our customers with a well suitable Backup system that will guarantee reliable backup of the environment. We work with leading brands on the market like Barracuda and Veeam.

Infrastructure

Infrastructure management system

Management of on-premise infrastructure is still very often done with the System Center Configuration Manager tool. At ISCG, we have experience in supporting our customers in the area of this technology.

Infrastructure

Infrastructure monitoring

We perform on-premise Infrastructure monitoring services. For this, we use native tools available within Microsoft Active Directory, Exchange, SCOM services as well as tools from leading manufacturers in the market.

Infrastructure

Distribution of parcels

Along with the implementation of SCCM (System Center Configuration Manager), the ISCG team supports customers in preparing software packages to be distributed to workstations in the organization.

Infrastructure

Databases

As part of our services in the area of on-premise infrastructure, we provide SQL database licenses. We also support customers in the management, reconfiguration and development of database environments.

Infrastructure

Active Directory

Active Directory (AD) is an advanced directory system that provides companies with centralized management of user identities, network resources and security policies. With extensive integration capabilities, scalability and advanced access control mechanisms, AD enables secure and efficient organization of the IT environment.

Azure

Landing Zone

Using Microsoft's best practices, guidelines and tools, we prepare a reference architecture for the solution in Azure, including, among other things, a network diagram, access and user identity management, failover security, encryption and monitoring of the environment and data.

Implementing this architecture enables efficient infrastructure management and operational optimization, while ensuring high data availability and security.

Cyber Security Services

Cyber Deception Services

Cyber Deception is a cutting-edge security strategy that relies on the creation of fake environments, traps and false resources to mislead cybercriminals. It allows organizations to effectively detect attacks and learn from attackers' behavior before they can do real damage. This allows for early detection of threats that traditional security systems (NGFW, NDR) may miss. With confusing paths and attractors, attackers are guided to controlled locations, giving them time to react, minimizing potential damage. With Cyber Deception, we can detect attacks earlier, reduce risks and losses by engaging cybercriminals in attacks against false targets, better understand attackers' actions through analysis in a controlled environment, and increase security by complementing existing security systems in the infrastructure.

Modern workplace

An efficient and secure MS Teams environment

We offer support in the development of the Microsoft Teams environment to make it as effective as possible for employees and at the same time safe for the organization.

Our services include automating the creation of assets, such as feeds, groups, sites and tabs, according to company policies, ensuring consistency and compliance with internal standards. We also provide standardization of descriptions and metadata to facilitate organization and information retrieval. We review current and archived resources, helping to optimize workspace, and manage access for employees and external visitors, ensuring compliance with security policies.

Modern workplace

Digitization of HR processes

We offer comprehensive HR process digitization solutions that will allow your company to optimize and automate key areas of HR management.

Our services include digitizing processes such as recruitment - from automating candidate management, to digitizing onboarding and offboarding, to implementing effective training management systems. We also help with electronic leave management, the implementation of advanced 360 employee assessment tools, and the full digitization of HR documentation, allowing easy access to employee data and reducing paper documents.

Our solutions not only improve the operational efficiency of the HR department, but also support better workflow, regulatory compliance and improved employee experience.

Modern workplace

Services for Microsoft 365 Copilot

We offer a comprehensive and secure implementation of Microsoft Copilot in a Microsoft 365 environment, providing full support at every stage of the process.

Our services include detailed configuration of the tool, taking into account the specific requirements of your organization, and assistance in meeting the highest standards of IT security and compliance.

In addition, we support the adoption of Copilot by employees, offering training and support in integrating it into daily work processes. We also provide long-term maintenance of the solution, including regular backups and monitoring to ensure business continuity and data security.

Modern workplace

Chatbots

We offer implementation of advanced chatbots based on Microsoft Azure AI, Copilot and Microsoft Teams technologies to improve communication and process automation in your company.

Our solutions enable the creation of intelligent assistants to help with customer service, employee support and the automation of administrative tasks. Through integration with Microsoft Teams, chatbots can act as virtual assistants available within daily work tools, providing quick responses, technical support and performing routine operations.

The use of Azure AI and Copilot guarantees continuous learning and customization of chatbots to meet the specific needs of your organization.

Business Applications

IT governance services

We support our clients in implementing or optimizing IT governance for Microsoft solutions and technologies. We offer both in-house services developed on the basis of many years of experience and ready-made partner solutions to facilitate and accelerate the implementation of governance.

Business applications

Implementation of e-signatures
and e-seals

Working with leading trust service providers, we provide solutions using electronic signatures and electronic seals.

We provide both qualified and non-qualified solutions.

The trust services we offer can be stand-alone solutions or part of larger systems - such as systems for managing e-contracts.

M365

Auditing and optimizing your Microsoft 365 environment

Regular reviews of your Microsoft 365 environment are key to maintaining compliance with best practices and security standards. Our audit offerings, performed by ISCG, provide a thorough analysis of your Microsoft 365 configuration, identifying security gaps, regulatory non-compliance and other risks.

With a Microsoft 365 audit, you gain configuration optimization that maximizes the efficiency of your environment. You can save on unused licenses - up to 40% in costs. Additionally, you'll increase data security by focusing on protecting your business from threats.

Our audits focus on key areas such as analyzing redundant privileges and evaluating phishing and spam protection policies. Based on the results of the audit, we develop detailed recommendations for improving security, performance and compliance, and then help you implement these changes. Upon completion of the audit, you will receive a detailed report to help you improve security, remove unused licenses and implement best practices in Microsoft 365 management.

M365

Development and maintenance of M365 standards

ISCG offers a comprehensive service for developing and maintaining cloud management standards, with the goal of improving the security and efficiency of Microsoft 365 environments. Customers often neglect regular reviews and audits, leading to gaps in procedures and standards.

Our team of experts performs a detailed assessment of configurations and management policies, identifying gaps, incompatibilities and risks. If necessary, we use third-party tools such as Simone Cloud and Microsoft Score to help align configurations with applicable standards, such as Baseline and CIS.

We prepare and document the key procedures that are necessary to properly manage a cloud environment. We regularly review and update this documentation to ensure it is in line with best practices and changing requirements.

Based on the analysis, we develop recommendations for improving security, efficiency and compliance. We help implement these changes and monitor their effectiveness through periodic updates to management policies.

With our service, customers can rest assured that their Microsoft 365 environment is compliant with best practices and properly secured. When you work with ISCG, you get a partner who cares about the growth and security of your cloud business.

M365

Microsoft 365 24/7 support

As a Managed Services partner, we specialize in comprehensive maintenance of Microsoft 365 environments for numerous clients, including large organizations with thousands of users. Our offering includes all Microsoft 365 packages, allowing companies to focus on their business, leaving technology issues in the hands of experts.

Many organizations face difficulties due to insufficient competence to manage their environments, which can lead to misconfigurations and serious data security problems. Customers often overlook important issues, which can generate risks.

With dedicated first, second and third line support teams, we provide comprehensive support. Our Microsoft 365 support operates 24/7, 365 days a year, allowing us to resolve issues quickly. We serve customers in 26 countries, offering advanced assistance for more complex issues. With our global reach and fast response time, we minimize the risk of downtime and ensure uninterrupted continuity of your Microsoft 365 services.

As part of the contract, we provide clients with the necessary data and reports with recommendations for changes in the environment, as well as FinOps data. We regularly discuss this information with the client, which allows us to jointly develop the competencies of local teams.

M365

Backup of Microsoft 365 configuration and data

ISCG offers comprehensive data backup and archiving solutions for users using Microsoft 365, covering services such as SharePoint, Exchange Online, OneDrive and Microsoft Teams. Our approach guarantees full data security and quick access to backups in case of data failure or loss.

As part of our services, we offer backup of both data and settings of the Microsoft 365 environment. Both of these functionalities are crucial, especially in the context of regulations such as the FSA, which require business continuity and auditability. Data backup allows you to recover information after a disaster, such as a ransomware attack or other incidents. Configuration backup allows restoring the environment to a stable state and auditing the changes made, making it easier to identify deviations from recommended configurations.

We use proven tools such as Veeam, CodeTwo, Barracuda and CoreView to ensure effective data management. CoreView provides advanced analytics and reporting capabilities, enabling better license and security management in a Microsoft 365 environment.

ISCG uses Simeon Cloud solutions, which offer advanced configuration management features. This tool allows you to save environment settings and compare them with recommended CIS and baseline configurations. This makes it easy to identify deviations and receive recommendations for optimization. Simeon Cloud also allows you to track the changes you've made, which increases transparency and control. Users can create backups of their configurations and manage changes, as well as restore the full configuration from a specific day, which is extremely useful in emergency situations.

ISCG provides comprehensive and secure data backup and Microsoft 365 configuration solutions, enabling organizations to effectively manage their resources and ensure business continuity under all conditions.

M365

Entra ID implementation and audit

Correctness of directory services is crucial for companies to ensure consistency and security in managing identities and access to IT resources. Improperly managed directory services can lead to security vulnerabilities, unauthorized access, and performance and regulatory compliance issues.

We have advanced Microsoft specialization in Identity and Access Management, so you can be sure of the best experience from our engineers. We offer a comprehensive Entra ID (formerly Azure Active Directory) implementation service for organizations with a scale of 50-100 thousand users, as well as smaller companies. With extensive knowledge of directory services and integration with various versions of legacy systems, our implementations are efficient and reliable. We support multi-location projects and integration of different domains, allowing for centralized management of access and identities.

We also perform one-time or regular Active Directory (AD) audits, which are essential to ensure that the configuration remains optimal and secure. Audits allow you to detect and address potential security vulnerabilities, check compliance with internal and external regulations, and monitor system performance. Regular reviews also enable you to respond quickly to changes in your organizational and technological structure, minimizing the risk of unauthorized access and ensuring business continuity.

M365

Implementing Microsoft Teams

Microsoft Teams is an advanced communication and collaboration tool that acts as a central hub for daily work, integrating key business applications and ensuring the smooth flow of information within the company. It offers features such as chat, videoconferencing, file sharing and advanced workflow mechanisms to smooth approval processes and automate tasks, eliminating the need for multiple tools.

ISCG specializes in Microsoft Teams implementations and offers full support for integration with existing systems, user and access management. Our differentiator is our competence in integrating Teams with low-code platforms, which allows us to create and implement optimal business processes without advanced programming. As a result, we are able to offer solutions that take into account the specifics of Teams operations, supporting process automation and efficiency.

In addition, ISCG's offerings include Teams Room Calling, an integration of audio conferencing systems with telephony to enable seamless online conversations and meetings. Although Microsoft Teams is a well-known tool, many companies use only part of its potential. That's why we offer user training to take full advantage of Teams' advanced features and its integrations with other tools, making daily team work much faster and easier.

M365

Mail migration to Exchange Online

Migration of mail from various systems such as Google Workspace, Lotus Notes, local providers or on-premisse servers to Exchange Online is a key part of the transformation to Microsoft 365 cloud. ISCG's team has extensive experience in large-scale migrations involving distributed environments with thousands of mailboxes. In such complex projects, we use third-party migration tools that automate the process and enable detailed migration auditing, ensuring full control and data security. This allows us to carry out the migration quickly and securely, minimizing the risk of data loss and downtime for the organization. We offer comprehensive support at every stage, from analyzing your current environment to moving emails, contacts and calendars, ensuring your business runs smoothly. Thanks to advanced security methods, your data is protected and the migration takes place at convenient times, limiting the impact on current operations. Once the process is complete, we also offer training and technical support so users can get the most out of Microsoft 365

M365

CSP licenses

As a Microsoft Bill Direct ISCG provider, we offer Microsoft 365 licenses at attractive prices, supporting our customers to effectively manage their cloud resources. Our licensing optimization consulting allows you to maximize the use of available resources.

In addition, we establish close relationships with our clients, enabling them to benefit from the expertise of our best architects. We offer continuous 24/7 support services, which gives our clients a sense of security. As a partner with the right expertise, we monitor their environment, catching potential threats and responding to them quickly. The Microsoft 365 platform processes business-critical information, so it deserves the special attention and care we provide to our customers.

M365

M365 and Co-Pilot platform management workshop

We offer a comprehensive training program on managing the Microsoft 365 platform, led by a top MVP architect in the area of this technology. Our courses focus on key aspects such as managing licenses, permissions and data security. Participants will gain the knowledge necessary to effectively manage their M365 environment, allowing them to optimize processes and increase productivity.

We particularly focus on the Copilot for Microsoft 365 tool, which supports task automation and facilitates daily collaboration. Through sessions led by an expert, participants will learn not only about the tool's capabilities, but also about the myths and facts associated with it. They will learn which features work effectively and which still need to be refined, allowing them to have realistic expectations and be better prepared to use the tools in their daily work.

Training is customized to provide the practical skills and competencies needed to effectively manage the platform and protect data

Azure

Optimizing the Azure environment

We offer comprehensive services to reduce costs and increase efficiency in Azure cloud environment

Our service includes a cost audit and resource utilization analysis, which will allow us to identify areas for optimization. We will focus on monitoring workloads, optimizing test environments and reducing the number of virtual machines.

In addition, we will migrate from the Pay-As-You-Go model to long-term bookings, which can save up to 50%.

Azure

Landing Zone

Using Microsoft's best practices, guidelines and tools, we prepare a reference architecture for the solution in Azure, including, among other things, a network diagram, access and user identity management, failover security, encryption and monitoring of the environment and data.

Implementing this architecture enables efficient infrastructure management and operational optimization, while ensuring high data availability and security.

Azure

Landing Zone

Using Microsoft's best practices, guidelines and tools, we prepare a reference architecture for the solution in Azure, including, among other things, a network diagram, access and user identity management, failover security, encryption and monitoring of the environment and data.

Implementing this architecture enables efficient infrastructure management and operational optimization, while ensuring high data availability and security.

Azure

Backup data to Azure

We deliver advanced data backup configuration to the cloud, with a focus on security, efficiency and compliance with the best market standards. Our approach includes precise governance preparation, robust procedures and integrated processes, supported by the latest tools.

We design a backup architecture, tailoring it to your organization's specifics, and then configure backup solutions according to your strategy. We implement automated backup mechanisms and monitor processes in real time, ensuring data integrity and quick detection of problems. We regularly test the recovery process to ensure that backups are complete and effective.

Azure

Entra ID implementation and audit

Correctness of directory services is crucial for companies to ensure consistency and security in managing identities and access to IT resources. Improperly managed directory services can lead to security vulnerabilities, unauthorized access, and performance and regulatory compliance issues. We have advanced Microsoft specialization in Identity and Access Management, so you can be sure of the best experience from our engineers. We offer a comprehensive Entra ID (formerly Azure Active Directory) implementation service for organizations with a scale of 50-100 thousand users, as well as smaller companies. With extensive knowledge of directory services and integration with various versions of legacy systems, our implementations are efficient and reliable. We support multi-location projects and integration of different domains, allowing for centralized management of access and identities. We also perform one-time or regular Active Directory (AD) audits, which are essential to ensure that the configuration remains optimal and secure. Audits allow you to detect and address potential security vulnerabilities, check compliance with internal and external regulations, and monitor system performance. With regular reviews, you can also respond quickly to changes in organizational and technological structure, minimizing the risk of unauthorized access and ensuring business continuity.

Azure

Pilot implementation

The pilot deployment is a key test phase in the Azure migration process, allowing identification and elimination of potential problems before full deployment. Organizations can test the migration on a smaller scale, allowing them to optimize the process. Our experienced IT architects conduct detailed testing, moving selected infrastructure and application components to the Azure cloud, monitoring performance, compliance and security. The pilot phase also allows training for IT teams and end users, ensuring a smooth transition to the new environment. As a result, it minimizes the risk of problems, increases efficiency and ensures readiness for a full migration.

Azure

CSP licenses

As a Microsoft Bill Direct provider, we offer the opportunity to purchase Azure licenses at attractive prices through the Cloud Solution Provider (CSP) program. Our offer not only includes access to the necessary licenses, but also the added value of consulting in the form of cost optimization using mechanisms for scaling, booking and changing the billing model. With our consulting, customers can effectively manage their cloud resources, minimizing costs up to 50% and ensuring optimal use of Azure infrastructure.

Azure

Landing Zone

Using Microsoft's best practices, guidelines and tools, we prepare a reference architecture for the solution in Azure, including, among other things, a network diagram, access and user identity management, failover security, encryption and monitoring of the environment and data.

Implementing this architecture enables efficient infrastructure management and operational optimization, while ensuring high data availability and security.

Azure

Environmental assessment

We conduct a thorough inventory of the entire local infrastructure (Microsoft and Linux) on the basis of which, we prepare a report with a valuation of potential cloud costs and a recommendation of an implementation plan.