information
security

Intelligence-based Security and Protection

WHAT
IS IT

As companies embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. One of the biggest challenges in digital transformation is ensuring security, privacy, and compliance.

In today’s world, it’s clear that increasing trust and managing security is a struggle for many organizations. If they do not adapt their approach to security, companies face the risk of significant financial loss, and damage to customer satisfaction and market reputation. Our team is there to help companies manage security concerns in an ever-evolving technology world that’s constantly under threat.

SECURITY
FACTS

2 Billion

icon

Over 2 billion customer records compromised from a variety of breaches such as Yahoo, Sony, Anthem, Premera, and Target

99 Days

icon

Approximately 99 days between infiltration and detection, on average

$17 Million

icon

The average cost/business impact per security breach in the U.S. is 17 million

BUILDING
BLOCKS

icon

SIEM

Security information and Event management

back image
icon

Behavior Analytics

User and Device Behavior Analytics

back image
icon

Endpoint Encryption

icon

Identity and Privileged Access Management

DLP

icon

Vulnerability Management

back image
icon

Penetration Testing

icon

Anti-Fraud Solutions 

icon

Policy Compliance

icon

ASOC

Advanced Security Operations Center

our
approach

We understand it is hard to calculate return of investment when you invest in Information Security. Measuring the probability of a data breach and the associated security risk is not a simple task. Maturity is needed to calculate the ROI considering the investment on a risk basis. Furthermore, security is not about tools only, it is more about processes and the right people.

 

This is why our approach is providing security as a service – a simplified way which covers the need for the right solution, following the exact processes and all operated by the appropriate people. Doing this we increase the value of the security investment exponentially, remove the capital expenditure and provide an easy exit for our clients if they are not satisfied with what we deliver or they just don’t think they need it.

 

We take Information Security seriously and approach protection of the systems landscape thoroughly. In everything we do, we see flexibility in delivery as a key factor. We always walk the extra mile and if required we can build, operate, recruit and train your own operation staff, and then transfer the working solution when your team is ready. We can even handle out of working hours operations saving you the burden to have 24×7 available security team.

person image

“TBS’s response time is quite fast and quotes are very detailed and clearly structured. They have coverage across EU which is also important for us and their scope of products is also wide enough to cover almost all our IT needs. They are very supportive with all additional questions that arise from our side.”

Rayna Vodenicharova Concentrix

person image

We’ve worked with TBS for more than 12 years and trust their team to meet our IT needs. TBS has provided high quality services, helping our business to move forward.”

Mr. Shekerletov, Director Global Applications ContourGlobal

person image

“Digital transformation is crucial to the growth of “Isobar Commerce”. With the help of Telelink Business Services, we have achieved outstanding results. TBS has been an indispensable partner in helping us progress on our digital journey.”

Stanislav Radkov Isobar Commerce

person image

“Telelink Business Services was the absolutely right choice for our IT advisor. We have a long technical relationship with them and especially successful project for implementation of a new MPBN network in VIVACOM started in 2015 and still ongoing which ensures the handling of all challenges with traffic and complexity growth.”

Boris Nazarov Vivacom

person image

“We always receive our quotes very quickly. Given the dynamics in our sector, this is very important for us.”

Yordanka Georgieva TELUS International Europe

person image

The team and staff have been an asset partner to ContourGlobal. Their knowledge and support of any system or process we give them has demonstrated that our choice in having them as a partner was a valuable add.”

Mr. Bree, Head of Global Infrastructure ContourGlobal

person image

“Time and time again, the Telelink Business Services team has been the go-to IT advisor for us. We are very impressed by their dedication and their professionalism. Our cooperation is essential for our business and we see TBS as a strategic long-term partner.”

Angel Gramatikov Dynata

information security
partners

the
team

person

Todor Iliev

Director Information Security

Todor heads the Information Security Department, composed of the regional Cybersecurity teams and the Advanced Security Operations Center (ASOC). He is responsible for sustaining the high level of implementation and support services of all information security projects and solutions in the company portfolio.

Todor joined TBS back in October 2014 as a Systems Architect, working on implementation projects within the scope of Information Security and Data Center Networking. With a client-oriented approach and keen interest in research and implementing new and complex solutions, Todor switched to the Presales team, responsible for the information security solutions in the TBS portfolio. Beginning of 2018 he was already leading one of the Technical teams with a focus on Cybersecurity. Composed of highly qualified experts in broad technology areas and with deep experience in various solutions protecting different layers in the clients’ IT infrastructure the team is operating on a regional level, covering clients in Bulgaria, Serbia and Macedonia.

Read More

Our team of experts is always striving to be at the front of the technology wave.

alt-image
arrow

Drag

arrow

Our
Accreditation

brand logo

Cisco Certified Internetwork Expert (CCIE)

  • 1x Cisco Certified Internetwork Expert (CCIE)
brand logo

CCNA Cyber Ops

  • 5x CCNA Cyber Ops
brand logo

IBM Qradar Certified Administrator

  • 1x IBM Qradar Certified Administrator
brand logo

IBM Guardium Certified Administrator

brand logo

RSA Certification Program

  • 4x RSA SE Professional in NetWitness; 4x RSA SE Masterin NetWitness; 1x RSA SE Professional in IAM
brand logo

Symantec Technical Specialist - Data loss prevention

  • Data loss prevention
brand logo

Qualys Certified Specialist

brand logo

FireEye Certification

  • 1x FireEye System Engineer (FSE); 1x FireEye Enterprise Incident Response
brand logo

Exabeam SIP Product Architecture EXPERT

  • 1x Exabeam SIP Product Architecture EXPERT
brand logo

ServiceCentrix "Resiliency in Cybersecurity"

  • 6x ServiceCentrix "Resiliency in Cybersecurity"; 6x ServiceCentrix "Cybersecurity Incident Management"
brand logo

Qualys Certified Specialist

  • 6x Qualys Certified Specialist

Contact our team now.

Contact Us