Kåre Rude Andersen expert inom System Center
Kåre Rude Andersen
Markus Lassfolk expert inom Security
Markus Lassfolk
Johan Arwidmark expert inom Windows Server, Windows 8, System Center, MVP
Johan Arwidmark
Henrik Garpenrud expert inom Exchange
Henrik Garpenrud
Mikael Nyström expert inom Windows Server, Windows 8, System Center, MVP
Mikael Nyström
Shanti Lindström expert inom Security
Shanti Lindström
Johan Blom expert inom Security
Johan Blom
Fabio Viggiani expert inom Security
Fabio Viggiani
Hasain Alshakarti expert inom Security, MVP
Hasain Alshakarti
Kent Agerlund expert inom System Center, MVP
Kent Agerlund
Tommy Clarke expert inom MVP
Tommy Clarke
Marcus Murray expert inom Security, MVP
Marcus Murray
Björn Brolin expert inom Security
Björn Brolin

Security
Development
Windows Client
Windows Server
Infrastructure
Deployment
Skype for Business


 

Active Directory
Even the most complex implementation will be so much easier to perform with an expert by your side. Our experienced consultants have deep knowledge in server implementations.
Business Productivity Online Standard Suite (BPOS)
Even the most complex implementation will be so much easier to perform with an expert by your side. Our experienced consultants have deep knowledge in server implementations.
Code Review
Get control of the security level of your proprietary code. We perform code-reviews of all types of software, including web- and desktop applications, kernel drivers, network protocols and much more!
Direct Access
If you are interested in introducing Direct Access in your IT environment, we will help you in all stages from developing a design proposal to the entire implementation. We help you to a solution that works!
Exchange design and implementation
Microsoft Exchange is now a critical system from a business standpoint, and that is why it is important that you are 100% secure in your implementation. Our experienced consultants have deep knowledge in server implementations.
Incident Management Intrusion
Truesecs methodology, tools and experience are invaluable when you are hit by hacking or intrusion attempts. We have successfully completed several project with banks, government agencies etc.
Incident Management Malware
Truesecs methodology, tools and experience are invaluable when you are a victim of a virus attack or other type of malicious code within your business.
Infrastructure Health Check
We identify a number of control points that are essential for you to be able to maintain a proper function, stability and performance of your IT environment.
Infrastructure Migration
TrueSec implements infrastructure migrations and upgrades in all different environments, but our main strength is in the Microsoft environment.
Infrastructure Optimization
TrueSec uses the Microsoft infrastructure optimization model to help you better understand how to use Microsoft's components to get a cost effective infrastructure.
Network Segmentation
Togheter with Sweden's leading companies, we have developed segmentation solutions that are 100% optimized to meet the standards while delivering high security without imposing any unnecessary burden.
OS Deployment
Even the most complex implementation will be so much easier to perform with an expert by your side. Our experienced consultants have deep knowledge in the Windows client and server implementation.
Patch Management
In Swedish companies and authorities patch management is one of the security mechanisms that tend to be most critical for protecting servers and clients from attacks and malicious code. We can help you!
Penetration Test
We are the leading penetration test house in Sweden. Our methodology has been refined and developed from a multi-year collaboration between Sweden's foremost security experts and Swedish corporations,
PKI and Certificate Services
Truesecs experts in the PKI are acclaimed both within and outside Sweden. Our expertise spans the entire range from the complex design of the new PKI to advanced troubleshooting.
Remote Desktop Services
Even the most complex implementation will be so much easier to perform with an expert by your side. Our experienced consultants have deep knowledge in server implementations.
Reverse engineering
Reverse engineering in the software context, means to find out exactly what the software does and how it is structured. Our experts analyze malware, applications, network protocols, drivers and much more!
Security Health Check
In our Health Check, we analyze a large number of check points in your IT environment. The report will give you very good overview of your security strengths and weaknesses.
Troubleshoot and Restore
TrueSec's methodology are invaluable when you are suffering from downtime or disruption of your IT systems. We will troubleshoot and identify problems to create an action plan to prevent future downtime.
Unified Communications
Even the most complex implementation will be so much easier to perform with an expert by your side. Our experienced consultants have deep knowledge in the server implementation.
Virtualization (Hyper-V)
Even the most complex implementation will be so much easier to perform with an expert by your side. Our experienced consultants have deep knowledge in server implementations.
Windows Client
Our experienced experts have deep knowledge in imlementation of Windows client. They will implement Windows 8 Client OS in a correct manner, with a guarantee that new features and functions gets fully utilized.
Windows Server
Even the most complex implementation will be so much easier to perform with an expert by your side. Our experienced consultants have deep knowledge in server implementations.