About


We took as our mission to help and support businesses, companies and end users around the globe with their all-day IT and IT security challenges. We are supporting all kind of IT projects from the very early planning phase across consulting, design, implementation, development, delivery and education of the operating staff till the very end of the handover phase and even after, where we are also remaining as technical support or escalation point if needed.

itechos, s.r.o.'s legal form by the Slovak law is Legal Person, which carries on business as a company. The business is registered in the Commercial Register of the District Court of Nitra under no. 45100/N in the Slovak Republic.

"Treat others the way you want to be treated."

Professional Background

My experience with information technology begins with my basic school days back in the late 90's. I was learning how to write an algorithm in BASIC, KAREL and Comenius Logo programing languages. With almost 15 years of IT experience (support, migration, scripting, consultancy, technical sales, etc. ) behind I was interested in the IT Security area where I gained more than 5 years of experience now. I am operating mainly in the Central Europe, but I was sucesfully delivering services and solutions in the Nordics region as well. I am working with variety of Vendors to deliver the most satisfying solutions and services.

Spoken Languages: EN | HU | SK | CZ | DE


SPŠE Nové Zámky Slovakia

2001 - 2005 | Electronic Computer Systems




BUT FEEC Czech Republic

2005 - 2009 | Microelectronics and Technology

2009 - 2011 | Telecommunications and Informatics

Microsoft

MCSE | MCSA | MCITP | MCDST | MCTS | MCP

Varonis

VCTA-I | VCTA-AI | VCTA-ODA | VCTA-DP | VCTA-DNIC | VCTA-ITS | VCTA-DW | VCTA-VSCA | VCTA-VSC

Kaspersky Lab

KATA - Kasperky Anti Targeted Attack Platform

Visualize

ValueSelling

Portfolio


We are working with the most advanced technology in IT and IT Security field. We are providing solutions from the very basic infrastructure category to the most advanced data protection technologies. Your infrastructure and security needs will be fulfilled if you are looking for on-premises or cloud solutions even in data governance, SOC/SIEM integration, enpoint security, network security, privileged account management, password management, etc.

Go to webpage

On-perm infrastructure and cloud enabled services.

Windows File Server SharePoint Exchange Active Directory Office 365 Cloud Server side Endpoint side Virtual Machine

Go to webpage

German quality Access Right Management for all IT people.

Windows File Server SharePoint Exchange Active Directory Office 365 Netapp NAS EMC NAS Server side Virtual Machine

Go to webpage

Data governance with security dashboard to eliminate inside threats as well.

Windows File Server SharePoint Exchange Active Directory Unix/Linux File Server Office 365 Netapp NAS EMC NAS Own Cloud Virtual Machine

Go To webpage

Network, Endpoint and Server security solutions.

Network side Server side Endpoint side HW Appliance Virtual Machine Cloud

Go to webpage

Most advanced leading IT security services and solutions.

Network side Windows File Server Endpoint side Server side Cloud Virtual Machine

Go to webpage

Leading data governance and data security from inside out.

Windows File Server SharePoint Exchange Active Directory Unix/Linux File Server Office 365 Netapp NAS EMC NAS Own Cloud Virtual Machine

Go to webpage

Straightforward Multi-factor Authentication, PAM and PSM solutions vendor.

Network side HW Appliance Virtual Machine PAM and PSM

Services


We are offering various infrastructure and security services based on the products described in the Portfolio. Including Product demo, deployment of the trial versions and production implementation with support.

Consulting

Consulting

Revision of affected systems and processes | 3rd party Workshops | Project Planning | Data analysis | Solution advisory and selection process | Technical Advisory

Design

Design

IT Infrastructure | Small and Medium Network | Standard and Advanced IT Security Infrastructure | Security policies

Deployment

Deployment

Windows Server and Enpoint best practices | Microsoft porducts best practices | Software based IT and Security solutions | Network and Firewall Policies

Implementation

Implementation

Hardware based appliances | Communications and Connections between various systems | 3rd party tools | MDM/IAM/ARM/PAM/Multi-factor authentication solutions

Professional Services

Professional Services

Sales/Pre-Sales/Business Development work | Technical Support and Troubleshooting | Technical Training for IT and End users | Remediation of affected Systems

Development

Development

Technical education knowledge | PowerShell Scripts | Automation processes | End user IT Security education knowledge

Contact Us