Our Services

Focused on information security, the services provided by ATHENA cover both aspects of governance, management and operational management of information security.

  • Forensics Analysis

    In case of a security incident or a cyber-attack , do you need to retrace what happened... more

  • Managed Services

    ATHENA offers to companies the ability to outsource part or all of their information security activities.. more

  • Governance and strategy

    Are your IT investments creating value ? Are your business processes taking full advantage of more

  • Awarness

    Do you have difficulties in passing your requirements in information security by your employees?..more

  • Audit

    We propose to evaluate the security level of your Information system through customized audits that meet.. more

  • Consultig

    Do you need a third-party independent, neutral and objective review and analysis of your technical.. more

  • SOC implementation

    You need to optimize the operational management of your security and assemble your own Security Operation Center?.. more

New services on board

ATHENA is proud to introduce its new services.

Do you need information security specialized resources? ATHENA offers you consultants who could reinforce your team and help you achieving your information security goals. Please feel free to fill in the form below with information about your need and your contact information.

  • Education level
  • Experience
  • Certifications
  • Requested competences
  • Assignment localization

As a PCI SSC QSA (Qualified Security Assessor), ATHENA TUNISIE supports your PCI DSS approach and offers the following services:
  • PCI DSS Training:
    • Key Concepts
    • Requirements
    • Implementation of Recommendations
  • Support in the scoping study and defining the scope of your PCI DSS certification project
  • Support in PCI DSS compliance and maintaining of your certification:
    • Gaps identification
    • Policies and procedures development
    • Development of the technical specifications for the acquisition of compliance solutions
    • Implementation and test of compliance solutions
  • Recurrent Audits of your perimeter PCI DSS scope:
    • External Penetration Testing
    • Internal Penetration Testing
    • Internal vulnerability scans
    • Wireless access points detection and identification
    • Firewall and router rule sets review
  • Mock Audit to prepare for PCI DSS certification
  • Certification audit