We help to integrate security elements efficiently and reliably into the technological units of your business. From cloud security through access management to testing preparedness for a cyber-attack. We provide assurance that any changes will be fundamentally safe and allow you a quick return of your investment. If necessary, we will ensure the initial achievement or verification of the necessary security level.

Identity & Cloud Security (ICS)

cloud security
cyber security

Privileged Access Management (PAM)

We offer an extensive range of Privileged Access Management (PAM) services, tailored to meet the needs and requirements of our customers and their operational technologies. A PAM system is a key element in enhancing your organization's security by providing effective control and monitoring of privileged access to critical systems and data. Our Privileged Access Management services are based on rich experience and knowledge gained from numerous domestic and international projects. Our goal is always to create solutions that secure privileged identities while supporting the growth of the entire organization and streamlining its internal processes.

In the area of PAM systems, we primarily focus on products from providers such as CyberArk, Delinea, Microsoft, Akeyless, and others.

cyber security

Cloud Security

In the field of cloud security, we offer comprehensive solutions to protect your cloud environments. Thanks to our deep knowledge in cloud and cybersecurity areas, we provide services that enhance the security of your data and applications in the cloud, secure your infrastructure, and ensure compliance with legislative standards. Our approaches are designed to meet the specific needs of your organization, allowing you to use cloud operations with confidence and assurance.

Within the Cloud Zero-Trust framework, we specifically focus on: 

  • Microsoft Entra ID - We ensure the protection of identities in the cloud environment, which includes managing access, authenticating users, and protecting against unauthorized access.
  • Microsoft Purview - We offer solutions for data protection in the cloud, enabling their classification, monitoring, and security against unauthorized access and data breaches.
  • Azure infrastructure - We provide comprehensive protection of Azure infrastructure, including securing virtual machines, databases, and other services against external and internal threats.
  • Secure onboarding of Microsoft Copilot - We ensure the secure deployment of Microsoft Copilot to protect your data against data leaks, which includes managing and controlling access to data and their security.
cloud security

Contacts

Martin Zbořil

Martin Zbořil

Identity & Cloud Security Leader, PwC Czech Republic

Tel: +420 734 783 921

We unite expertise and tech so you can outthink, outpace and outperform
See how
Stay on top of things with us!
Hide

You are looking for an expert to help you; you want to request our services; or simply ask something? Let us know about yourself and we will get back to you as soon as possible.

I acknowledge that my personal data provided in the registration questionnaire will be processed by entities from the PwC network mentioned in the "Data controller and contact information" section in the Privacy Statement. This is done in accordance with appropriate legal provisions (mainly the Regulation of the European Parliament and the Council (EU) 2016/679 of 27 April 2016, the General Data Protection Regulation (GDPR) and Act. No. 110/2019 Coll., on personal data processing, as amended) based on the legitimate interests of the above mentioned PwC network entities in order to proceed with my request.

Please, read our Privacy Statement where you can learn more about our approach to personal data and your rights, in particular the right to object to processing.