Data Driven Solutions

Turn your own data into powerful solutions

Ensure your company's security by efficiently monitoring data streams. Respond to security incidents before they happen.

Find out more

Onesys expert services

Splunk Consulting

Each infrastructure is exposed to failures and external attacks, regardless of the level of implemented redundancy and Cybersecurity solutions. Therefore, it is important to prepare it for similar events. Use the data you have to monitor your infrastructure and reduce the response time to an incident to a minimum.

Splunk Enterprise

Splunk Enterptise Security

Splunk IT Service Intelligence

Our engineers have many years of certified experience in working with Splunk dedicated solutions: Enterprise (Certified Architect), Enterprise Security (Certified Admin), IT Service Intelligence (Certified Admin).

Implementations

We offer the service of a complete, dedicated construction of the Splunk® environment, both based on the Customer's existing infrastructure, in a dedicated cloud or based on Splank cloud solutions.

Audit

We audit the existing infrastructure in terms of implementation, configuration, expansion and quality of monitoring processes.

Cyber ​​security

We conduct a comprehensive security audit of the implemented infrastructure, equipping it with a number of preconfigured threat-hunting rules.

SIEM: on-premise or in the SaaS model

Security Information Event Management

We have many years of documented experience in developing, implementing and migrating infrastructure monitoring rules in the SIEM (Security Information Event Management) model.

  • Working with any framework (MITRE ...). 
  • Trainings and audits at the client's premises

We also offer a SIEM service in the SaaS model

Security Operation Center (SOC)

Building Safety Teams

Security Operation Center (SOC) is a solution inside the organization. Dedicated team equipped with IT processes and solutions, established in order to constantly monitor the infrastructure, detect security incidents and react.

Our team has built from scratch or improved the processes of existing SOC teams for many corporate clients in Poland and abroad.

Penetration testing & Red Teaming

Penetration testing, or in short, pen-test is a simulated attack on an IT system or applications in order to assess the level of security and detect existing vulnerabilities that can be used for unauthorized access to data.

Unlike pen-tests, where the scope of tests is predetermined and limited to a given system / systems or applications and does not require attackers to hide the attack, red teaming is a simulation of an attack by existing cybercriminal groups using techniques and procedures that are the same or very similar to the group which is simulated. Red team conducts an attack on IT systems or applications, trying to remain undetected until the assumed goals are achieved.

Process management with Onesys

Streamline your business, give your teams peace of mind.

Service management is a set of organizational skills that ultimately lead to the creation of value for service consumers, for the organization itself, and for other stakeholders. Value, understood as the benefit or significance of something, can be perceived differently depending on the role. For some it will be a high income, for others customer loyalty or development opportunities. Societies change dynamically, economies evolve, so the relationships between organizations are becoming more and more complex. Service management helps you understand how it is possible to create value in the form of services and service relationships.

The Information Technology Infrastructure Library (ITIL) is a set of best practices for IT service delivery. ITIL provides guidance on how organizations can meet new challenges in service management and how to harness the potential of modern technology. ITIL was created in such a way as to ensure flexibility and coordination of integrated systems for effective management of IT services.

Virtualization

Migrate your business to the Cloud

We offer consulting services in the field of customer infrastructure migration to the cloud, using commercial Amazon Web Services (AWS) solutions and the highest quality virtualization from VMware.

Our hybrid solutions ensure maximum security, are supported by over 15 years of experience in building secure Cloud structures, confirmed by documented implementations, stable processes and methodology.

  • Dedicated structure, built in the customer's Data Center based on proven components of Cisco, Fortinet, CheckPoint and others.
  • Amazon Web Services implementations
  • VMware vSphere, NSX-V / NSX-T virtualization

Onesys team

About company

Onesys is a provider of IT Security & Splunk consulting services that helps you implement Splunk into your infrastructure and move your data & monitoring to the next level. We aim to unearth the real value of data analytics. We deliver data-driven solutions in various areas, including IT operations, Internet of Things (IoT), security, advanced business analytics, compliance and more. Besides, complementing the life cycle of deploying and adopting the Splunk platform, our certified experts provide continuous support as well as managed services. Beside that we are skilled in SOC related topics, penetration testing, cloud infrastructure and service management. Moreover, our forward-thinking approach is based on building a strong relationship with our clients and helping them achieve their business goals.

Our Services

  • Splunk Consulting – architecture, deployment, improvements, audits, migrations, content implementations and more
  • SIEM Use Cases – design and implementation, future road maps, defining gaps, validations and processes, working with frameworks ex. MITRE, kill chain, risks
  • KPI and ITSI services – IT infrastructure monitoring
  • SOC Processes and Solutions – design and build solution and processes
  • Service Management – define and implement processes ex. ITIL
  • Cloud – architecture, deployment and consulting ex. AWS, Azure
  • Penetration testing – performing for applications and infrastructure

Quality and People

We never compromise on quality and have built processes to ensure that the quality is never at stake. Our pool of experts takes accountability for their tasks and toils relentlessly to do what they promise. All results are always checked and validated before are presented / implemented to client to ensure that meet all requirements in the best quality. Besides, we value our people and invest in their growth to get the best out of them.

We are holding certificates: Splunk Architect, Splunk ES Admin, Splunk ITSI Admin, ArcSight Analyst, CISSP, CISA, CEH, Comptia Security+, Comptia Network+, AWS Architect, CCNP, CCIE, ITIL, Prince2, Scrum and many more.

Customers First

We follow a customer-centric approach to understand their requirements and live up to their expectations. We work diligently to ensure that long-term goals are easily achieved and solutions are always evolving.

Certification

Onesys Sp. z o.o.

Ul. Bolesława Chrobrego 83, 87-100 Toruń

contact@onesys.pro, +48 606 290 382

VAT ID: PL8792734034

REGON: 389939833

KRS: 0000920774

Bank: mBank

BIC/Swift: BREXPLPWMBK

Bank account PLN: 82 1140 2004 0000 3302 8167 1123

Bank account EUR: 96 1140 2004 0000 3212 2036 5140