For the stable operation of your organisation, we provide you with an informative, high-quality presentation of our services. Primarily, we address the protection of information systems.
Managed services
Software as a service

We provide our customers with consulting services and offer the preparation of an IT environment and business processes in an organisation for the purpose of implementing new projects.

In the context of consulting, we provide an overview of the existing processes and practices from the perspective of data protection, user identity management, business continuity and designing adequate protection of the information system as well as other systems. Additionally, we carry out a hardware and software performance check and propose appropriate optimisation.

In our work, we follow standards and recommendations such as CoBIT, NIST, OWASP, ISO 2700x, ISO 22301, PCI and many other good practices.

Security policy

A security policy specifies the codes of conduct for all users of the information system and depends on security risks faced by an organisation, and the implemented technical solutions. The success of all activities related to increasing information security also depends on the appropriate definition of a security policy and its implementation as well as user education.

As the final step of the security review and the analysis of security and business effects, we organise appropriate seminars for our customers, where employees become familiarised with the results and proposed measures for reinforcing information security in the company. The latter then becomes the basis for further information security improvements – both in organisational as well as technical areas.

Business Impact Analysis (BIA)

Business Impact Analysis (BIA) often represents the first step and a closer look at the operation of an organisation. It is a systematic process of identifying and evaluating potential effects of disruptions on vital company operations. The information obtained allows the company to focus primarily on risks associated with the most sensitive parts of handling information and managing the information system.

The result of a Business Impact Analysis is the correction of the security policy document and the action plan for improving the current state of information security in the company.

Thorough verification (of users)

Practical tests of the information system and its users (employees) are also a very effective way of determining the state of information security in the company.

We offer customers a thorough review of the information system (ethical security check), which may also include various scenarios of the most frequent attacks through exploiting users’ negligence (e-mail or online frauds, social engineering techniques, etc.).

Maintenance of IT systems

Every company needs a reliable, stable, responsive and available information system that enables its employees to perform all business processes in the normal fashion.

We can take over the entire management of a company’s IT systems or offer assistance to its IT team. In the case of an agreement on the maintenance of the IT system and the provision of services, the target systems, their availability and responsiveness shall be contractually defined, and a technical administrator appointed.

As part of ensuring the operation of ICT infrastructural and software systems, we provide maintenance for:

  • server systems;
  • disk systems;
  • network equipment;
  • firewalls;
  • backup system;
  • databases;
  • intranet portals and
  • user identity management systems.

We also provide our customers with spare ICT equipment in case of potential failure and offer assistance in troubleshooting system and process errors.

Managed services

We offer customers managed IT services, taking care of the entire IT environment as well as its individual constituent parts – the cloud, platform, system, application, network and/or security. We provide custom managed services.

Office 365

Microsoft Office 365 is a service package which includes a digital storage, applications for document creation, editing and sharing, e-mail and other features.

The benefits of using Office 365 are apparent:

  • you always have the latest version of Office applications available;
  • access the applications anywhere, anytime, and on all of your devices; with one user account, you can install the applications on 5 computers and 5 mobile devices;
  • option of monthly licence payments;
  • the number of licences can be adjusted at any time according to the company’s needs;
  • various Office packages offer a choice: select the one that best suits you.

Other licences

We can assist you with the implementation or purchasing licences from the following partners:

  • VMware
  • Veeam
  • CheckPoint
  • Microsoft
  • Juniper
  • IBM
  • HP
  • One Identity
  • Cisco
  • Aerohive
  • Stormshield
  • Dell
  • Quest


ADDRESS: Mariborska cesta 7, 3000 Celje
PHONE: +386 3 828 0 310
FAX: +386 3 828 0 311
hello world!


BRIHTEJA, inovativne IT rešitve, d.o.o.
VAT number: SI 26561263
Bank account: SI56 0242 6026 2989 747 – NLB d.d.
Base capital: 75.000,00 EUR
Register number: 3913589000


Don't miss our events, follow us on social media.
Scroll Up linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram