
Our approach in data privacy projects focuses on process, organization and resources. We always approach data privacy projects with an intention of ”GDPR as an opportunity”. We form and complement lawyers and IT specialists in one team and deliver complete solutions:
1. We provide Data privacy services on business principles:
Our approach in data privacy projects focuses on process, organization and resources. We always approach data privacy projects with an intention of ”GDPR as an opportunity”. We form and complement lawyers and IT specialists in one team and deliver complete solutions

We can provide for you services such as:
GDPR maturity assessment & GAP analysis
Is your GDPR program under control? Have your GDPR program audited with GAP assessment and RISK analysis. Rate your organization’s GDPR maturity.
Implementation & alignment projects
Projects improving organization’s GDPR compliance (based on GAP analysis) Consulting and PM services
Technology solutions for GDPR program.
Consulting, Privacy by design and beyond
- Data privacy ensured by alignment with IT & cyber security
- BPM, ISO2700x
- Cyber security law
- GDPR as an opportunity
EU representative
GDPR EU representative function for non-EU entities
DPOaaS
Data Protection Officer (DPO) as-a-service, remote & on-site
Data privacy education
Awareness of management, key employees, DPO’s & process owners
2. Consulting services: IT & project management, Business process automation or management consulting

We are experienced and ready to be your partner in any type of change or everyday business situations. Whether your business is growing naturally or through an acquisition; if you are looking for an investor; responding to market with a change; acting on business process optimization or automation need. We want to be part of it and help.
We can provide for you:
IT management & consulting
- IT strategy
- Modernization
- IT Exit strategy
- Vendor management & IT sourcing
- ITSM implementation and validation (ITIL)
- IT charging & budget
Business process automation
Optimizing and automating processes with micro services implementation or larger BP automation & robotics. So powerful and effective
Project management
We ensure your small to mid-sized projects are managed for success.
We establish or optimize your Project management office – PMO.
Management consulting
- Management & HR consulting
- Cost optimization
- Financial planning
- Product pricing model
- Structural EU funds consulting & projects
Management consulting
- Management & HR consulting
- Cost optimization
- Financial planning
- Product pricing models
- Structural EU funds consulting & projects
3. IT & Cyber security services
Employees-IT users are in many cases the weakest link in the organizations readiness to withstand cyber attacks. Our services focus on:
- Employee awareness of IT security principles
- Application and enforcement of security processes
- Endpoint security validation
- Practical audits of processes and IT security measures
- Testing of infrastructure | Data leak monitoring
We can provide for you services such as:
IT security awareness
Awareness of IT security & online behavior principles of the employees is key to protect the organization .
We make it happen – online and interactive
Employee IT security
We evaluate employee IT security & online behavior awareness
We perform a simulated phishing attack allowing you to finetune your organization’s IT security program
Password policy
One thing is the Password policy and password rules, the other one is its enforcement!
Username & password? 2FA? Single-sign-on? Passwordless or usernameless ?
Data leak monitoring
Has data such as login credentials of your employees been leaked and ”is on sale”?
We validate leaked data risk and provide Continuous data leak monitoring
Vulnerability assessment
We will allow you to understand the strong and weak points of your current system pointing out the opportunity to improve and develop your system.
Penetration testing
A SAFE Activity attempting to bypass or compromise security controls of the systems by simulating same techniques as hackers do.
4. Technology solutions: HW & SW solutions delivered to perfection
Dexterity – ability, capability, expertise, innovation – this is us! We can provide for you services such as:
HW, SW & solutions
Are you obliged to comply with GDPR? We perform GDPR audits & GAP analysis Rate your organization’s GDPR maturity
Data protection & People
Data privacy tools & management SW Data protection solutions – DLM, DMS Cyber rating solution
Mobile devices reverse flow
Development stage of a complete ocological eco-system for reverse flow and material re-use for mobile devices