Modern technologies relied on by the world today often formed by many complex and interdependant processes. Systems such as simple parking machines at the entrance have the expectation to performance complex tasks such as currency exchange. Along with the complexity, the nature of the systems role should be considered with considerations of whether they are life support systems or have the ability to affect health and safety of humans.. On an even wider scale, such as supporting critical infastructure for an entire country, providing such goods as energy and fuel. Overall, the good aspects of the development of these technologies are coming less positive; the technology is becoming more complex and difficult to understand. Many of these systems have been built by a few dozen experts in various fields but not usually with Computer Security in mind. Such a situation favors the creation of ever newer and more sophisticated methods of attack on these systems and it is more important that you can expect a greater effort on the part of criminals.

Immunity Systems is a young, highly specialized company engaged in the full range of issues related to IT security. The main asset of the company is a team of enthusiasts with over ten years experience in the IT security offensive and defensive including system implementation and verification of the levels of security systems implemented. The company's goal is to provide customers with systems and services that will ensure the highest level of security of their information and business processes while maintaining an optimal level of costs incurred.

ISO/IEC 27001:2013 Certified by TÜV Rheinland no. 9000021294

ISO/IEC 27001:2013 Certified by TÜV Rheinland no. 9000021294

W czerwcu 2021 r. Immunity Systems otrzymało certyfikat zgodności z normą ISO/IEC 27001. ISO/IEC 27001 jest międzynarodowym standardem oceny i certyfikacji zarządzania procesami bezpieczeństwa informacji, wydanym przez Międzynarodową Organizację Normalizacyjną. Oprócz technologii informatycznych, ISO/IEC 27001 uwzględnia również odpowiednie procesy biznesowe. Opisuje nie tylko wymagania stawiane organizacji i systemom technicznym, ale również odpowiednie działania mające na celu trwałe utrzymanie poziomu bezpieczeństwa określonego na podstawie oceny ryzyka. Jesteśmy dumni, że jesteśmy certyfikowaną firmą.
Przyjęta w Immunity Systems Polityka Bezpieczeństwa definiuje kompleksowe i efektywne podejście do zarządzania bezpieczeństwem informacji, co obejmuje:


CEH Certified Ethical Hacker

OSCP Offensive Security Certified Professional

OSCE Offensive Security Certified Expert

OSWP Offensive Security Wireless Professional

CSSA Certified SCADA Security Architect

GXPN Exploit Researcher and Advanced Penetration Tester

ESCA EC-Council Certified Security Analist

LPT Licensed Penetration Tester

Burp Suite Certified Practitioner

eWPT Web Application Penetration Tester

Microsoft Certified Professional

CCNA Cisco Certified Network Associate

FCNSP Fortinet Certified Network Security Professional

Certified Ethical Hacker (EC- Council)

RHCSA Red Hat Certified System Administrator

ITIL Foundation

ISO/IEC 27001 Zarządzanie bezpieczeństwem Informacji

CISA Certified Information Systme Auditor