Organizations need technology partners who run their strategies without interfering. In Ibis Instruments we value technology as part of a business unit. We help clients make reliable technology decisions that smooth the way to digital transformation to match the expectations of their consumers. After all, we are helping to develop technological frameworks that make our clients’ business more agile and more resistant to challenges and threats that are ongoing.

Security Assessment   Penetration Testing   Vulnerabilty management

Web application firewall – WAF

A web application firewall WAF is a special type of application firewall that applies specifically to web applications. It is deployed in front of web applications and analyzes bi-directional web-based (HTTP) traffic – detecting and blocking anything malicious. It typically protects web applications from attacks that affect layer 7 (application layer) from OSI model such as SQL injection, CSRF or XSRF (cross-site forgery), cross-site-scripting (XSS), LFI (Local File Inclusion) and RFI (Remote File Inclusion) among others. A WAF is differentiated from a regular firewall in that a WAF is able to filter the content of specific web applications while regular firewalls serve as a safety gate between servers.

Security Architecture and Implementation

The most complex operational challenges find their answer in the technologies and solutions that we offer. By combining our vendor’s recommendations with our team’s hands-on experience, we create value to the delivery as we enable the solutions to meet your organization’s business and compliance needs.

Our team of security architects performs at the highest level in leading your security projects as an “end-to-end” solutions from technology/vendor selection to technology implementation and optimization and usage training.

Data and Application Security

Data is the “heart” of business. To prevent data loss and control the data flow in/out of the organization, it’s of the utmost importance to manage the entire data lifecycle starting that the point of classifying the data as you can’t manage what you don’t know.

Aligning the data security strategy with the right technology and partner will support the effectiveness of the data protection program.

Our application security team combines extensive knowledge and experience to help ensure the growing application environment stays secure against new and existing threats. Combining manual testing with automated scanning and code review as well as partnering with leading scanning tools vendors brings a “all angles” approach to the application environment.

Security intelligence and forensics

More than 50% of the organizations are not using their investment in different technologies at the full capability.

Most of the organizations have found themselves investing seriously in different security controls within their environments over the time. But how are they making sure that they are ensuring the right level of protection? And do they know where the security gaps are and how to address them?

With an experienced team of attack and penetration consultants and proven methodologies, we work to undermine and organization’s existing defense perimeter and identify exploitable vulnerabilities before a malicious player will do. We validate the effectiveness of your current environment and enable you to make the right decisions to ultimately reduce risk across the business.


Industrial control systems (ICS) have become an attractive target for cybercriminals. The majority of these systems monitor complex industrial processes and critical infrastructures that deliver essential services such as power, water, transportation.

Ibis ICS security approach combines leading vendor solutions with intelligence and team expertise to deliver a holistic protection for the enterprise. Our team provides expert consultants who can help deploying the NIST Cybersecurity Framework to protect the critical infrastructure and develop an IT Security plan to better manage the risk across the organization.


GDPR is here to guarantee “data protection by design” which in practice means developing products and services with the concept “secure by design”.

Our GDPR offering may include based on the organizational maturity level and needs:

  • Readiness assessment
  • Data mapping
  • Training and awareness
  • Stress testing
  • Privacy by design

And DPOaaS – Ibis as a DPO assists clients on matters related to data privacy and data protection as well as GDPR compliance.

Koristimo "cookies" kako bismo unapredili funkcionalnost našeg veb sajta. Pritiskom na bilo koji link na ovoj stranici prihvatate korišćenje "cookies".