In today’s digital environment, data security is more important than ever. General and targeted attacks against organisations and individuals are prevalent and securing critical assets has become a mission-critical task in the always online, completely connected ecosystem we live in. Our cyber security services help you to design, develop and operate secure services that keep your and your customers’ valuable information confidential, intact and available. We can help you from the first steps of design to running and operating your service in a secure fashion.
Cyber security services
Cyber security services
How we can help – Our services
Discover the threat posture of your service
Our facilitated threat assessment service helps you identify and prepare for threats in a structured manner.
- Understand the security context
- Design appropriate mitigation
- Plan the implementation of controls
The assessment is conducted with a workshop-style method based on industry standard threat modelling practices.
Human-centric security design
Design your services with a security mindset
Our human-centric approach to security design allows you to design services with a security mindset.
- Ensure that security design actually meets user expectations and usability
- Plan for contingencies and continuity
- Prepare for unexpected events that might disrupt your capability to reach your business objectives
Secure software development lifecycle review and training
Improve your development security
We are experts in building secure software with industry leading secure software development processes and practices.
- Train your internal dev teams
- Evaluate current practices
- Form guidelines and requirements
We are more than happy to help you assess and improve your own practices, whether you are developing in-house or offering services externally.
Security assessments for software and services
Gain an expert opinion on your state of security
It is often necessary to have external expertise for evaluating the status of your services or software, either through a straightforward code review or an in-depth assessment of the security and practices of a service.
- Evaluation of practices
- Benchmarking to industry standards
- Clear, actionable recommendations
We offer a full suite of hands-on and practical assessment services that will give you actionable recommendations for improvement.
Test your security against real-life threats
Vulnerabilities exist in almost all solutions, and it is far better to find them before someone hostile does. Our penetration testing service helps you to:
- Find and report vulnerabilities in the target solution
- Black box testing against visible surfaces
Whitebox testing with access to code, config and documentation
Our penetration testing does not just find the vulnerabilities, but provides clear, actionable recommendations for fixing the issues, down to suggested code changes.
Ensure the quality of your cloud security
While the basic principles of cyber security are valid regardless of where you run your services, the cloud presents its own challenges in designing, building and operating secure services.
- Design secure cloud architecture
- Review cloud security practices
- Train operative teams
Whether it is hardening your cloud infrastructure, designing operating practices or building devops pipelines, our cloud security experts are up to the challenge and available to help you plan, implement and operate your cloud services.
“We design, develop and operate secure services that keep your and your customers’ valuable information confidential, intact and available.”
Our industry expertise – Medical device security
With the tightening security requirements of the two new regulations – one on medical devices (MDR) and the other on in vitro diagnostic medical devices (IVDR) – cybersecurity compliance has become an essential issue in medical device development. To demonstrate regulatory compliance, the manufacturer is required to present cybersecurity-related data from both pre- and post-market lifecycle phases. Also, the new version of the medical device software lifecycle standard IEC 62304 will include specific cybersecurity risk management requirements. It is essential to understand these requirements thoroughly and, most importantly, to know how to implement them in practice.
Solita Health is an ISO 13485-certified developer of medical devices. The ISO 13485 certificate solidifies the role of Solita Health as an international product development partner in the medical device industry. Operations controlled by the certified quality management system incorporate our core competencies, such as software development, user insight, service design, and strategic, data, and analytics expertise. Built on the success of Oravizio, the AI-powered risk assessment tool for surgeons, we have an exceptional ability to help you design and implement secure medical device software.
Medical device manufacturers are required to have a general risk management process to manage the safety risks related to their products. The risk management process must be compliant with the standard ISO 14971. Even if the security risk management has a broader perspective on risks, the process can be implemented similarly, and it can be aligned with the manufacturer’s current general safety risk management process. We can help you set up and document a security process that meets the regulatory requirements, is effective, and is based on your current workflow. We have specialised expertise in threat and security analysis and are able to help you identify the risks that are significant in the medical domain.
Health and well-being services are becoming increasingly digital. Artificial intelligence, analytics, cloud services, and open interfaces offer almost limitless opportunities for improving services and operations. When working in health and well-being, it is inherent to the domain that sensitive data is required to deliver the services the end-users need. The sensitive nature of the data calls for both regulatory compliance and an inherent focus on data protection. We understand and know the requirements, processes and technologies required and are ready to help you with securing your sensitive data from technical measures to governance processes.