Security & Technology Partner
Protection of the digital world without compromise
+420 778 778 051
Who we are & our philosophy

Who we are
Security is a discipline, not an add-on. It has its own teams, responsibilities, and reporting. Key principles:
  • Separation of design, operations, and control
  • Auditable, measurable, scalable
  • No conflict of interest – audit ≠ implementation
Our philosophy
A modular organization built for SMB, enterprise, and regulated sectors. We do not sell packages — we offer services in clear domains that can be combined according to the customer’s needs.
+420 778 778 051
What sets us apart
Clear separation of roles
We audit, but do not implement in the audit. We monitor, but forensics is handled by SHIELD, not SOC.
No conflict of interest
Each division has clearly defined competencies. The control function is strictly separated from the implementation function.
End-to-end under one partner
The customer does not have to coordinate 5 vendors. We cover the entire IT and cybersecurity lifecycle.
Coverage Overview – Entire Cycle
MAJEND covers the entire IT and cybersecurity cycle – from architecture design through operations and monitoring to audit and training. The customer works with one partner instead of five vendors.
Overview of all MAJEND divisions
MAJEND ACADEMY
Training & Education
1
2
3
4
5
6
1
Security Awareness + phishing simulations
2
Technical training in M365 and infrastructure
3
User onboarding and product training
4
Management and governance training
5
Hands-on workshops, certification preparation
6
E-learning platform and testing module
ACADEMY educates, not implements, not operates, not audits
MAJEND ADVISORY
Consulting & Architecture

1
2
1
Strategic Consulting
  • IT strategy & business-IT alignment
  • 1–3 year technology roadmap
  • Enterprise Architecture (TOGAF) – applications, data, infrastructure, security
  • Feasibility studies, ROI/TCO analyses
  • Solution design and pre-project phase
2
Governance & Advisory
  • Process consulting – AS-IS/TO-BE mapping, redesign
  • Governance frameworks (ITOM, roles, KPIs)
  • Change management – organizational impacts, communication strategy
  • Vendor management & contract consulting
  • Strategic security consulting (NIS2, KRITIS)
  • Program/Project advisory (PMO lite, risk management)
ADVISORY designs and recommends, never delivers operations
MAJEND AI
Artificial Intelligence

1
2
3
4
1
LLM & AI assistants
Integration of OpenAI, Azure OpenAI, and Mistral. AI chatbots and assistants for IT, business, and customer support. Custom GPT instances tailored to your needs.
2
Computer Vision & NLP
Analysis of CCTV streams (LPR, anomaly detection), text data extraction, document classification, meeting summaries, and log analysis.
3
Predictive Analytics & Governance
Prediction of incidents, capacity, and anomalous behavior. Fine-tuning LLMs, RAG on company data, AI governance, and model security.
4
AI for M365
Microsoft Copilot integration into Teams, Outlook, Word, and Excel. Copilot Studio apps and automation of internal IT processes.
AI delivers AI logic, infrastructure and integrations are separate
MAJEND AUDIT
Compliance & Readiness
NIS2, ISO 27001, CIS Controls readiness
Audit is strictly separated – we generate realistic roadmaps, not just paperwork.

1
2
3
4
5
1
Gap analyses and risk assessment
2
Audit of IT operational processes
3
Governance framework – policies, directives
4
Vendor risk management
5
Compliance monitoring (quarterly/annual)
AUDIT checks and evaluates, must not implement (no conflict of interest)
MAJEND AUTOMATE
Integrations & RPA

1
2
3
4
5
6
1
API integrations between systems (ERP, CRM, M365, FORGE, PROTECT)
2
Enterprise RPA: Power Automate, UiPath, Make
3
Process orchestration in IT and business
4
ETL/ELT and data workflows
5
Automation of ticketing, alerts, and SLA processes
6
API gateway and integration hub
AUTOMATE automates workflows and integrations, does not develop applications, does not operate IT
MAJEND MAJENDCARE
Managed IT & Helpdesk

1
2
3
4
5
6
1
MSP – complete IT operations management
2
Service Desk L1/L2, remote and on-site support
3
SLA – response times, reporting, problem management
4
Patching OS and applications
5
IT Asset Management and HW/SW lifecycle
6
IT staff outsourcing
CARE operates IT, does not handle security design or monitoring
MAJEND CORE
Infrastructure

1
2
3
4
1
Virtualization & Servers
Proxmox/KVM clusters, HA, storage (SAN/NAS/Ceph), Windows/Linux server OS
2
Networks
LAN/WAN/Wi-Fi, routing, VLAN, VPN (IPsec/SSL), load balancing
3
Backup & DR
Veeam, PBS, cloud backup, DR plans, VM replication, recovery tests
4
Hybrid Cloud & DevOps
IaaS (Azure), containers, CI/CD, Ansible/Terraform for infrastructure automation
CORE builds and operates infrastructure, does not address security or audit
MAJEND FORGE
Web & Digital Front-End

1
2
3
4
5
6
1
Web applications, portals, front-end and back-end
2
Headless CMS (Strapi, Contentful)
3
Ticketing systems and customer portals
4
Payment gateways (GoPay, Stripe, ComGate)
5
QR systems and digital turnstile logic
6
UX/UI design, CI/CD for applications
FORGE develops applications and UI, infrastructure and security are out of scope
MAJEND OPERATE
Cloud & Workplace (M365)

1
2
3
4
5
6
1
Entra ID – identity management, Conditional Access
2
Intune – device management, compliance, deployment
3
M365 service administration (ExO, SPO, Teams, OneDrive)
4
M365 governance – lifecycle, data policies
5
Tenant management and license optimization
6
Power Automate / Power Apps (user workflows)
OPERATE manages M365 and identities, security design is done by SHIELD
MAJEND PROTECT
Physical security

1
2
3
4
1
EZS & EPS
Electronic security systems and fire alarm systems – design, installation, service, inspections according to ČSN
2
CCTV
IP camera systems, LPR, facial recognition, motion detection, cloud/edge video storage
3
ACS & Turnstiles
Access control systems, RFID, QR, mobile credentials, electromagnetic locks, gates
4
Perimeter & Data Center
Infra barriers, radar sensors, rack monitoring, access zones in server rooms, panic systems
PROTECT delivers physical security, not IT or cyber
MAJEND SHIELD
Cybersecurity

1
2
3
4
5
6
1
XDR / EDR / MDR
2
Incident Response & Forensic Analysis
3
Vulnerability Management
4
Cloud & Network Security
5
IAM / PAM, Penetration Testing
6
Security Architecture & Threat Intelligence
Shield designs and delivers security, not IT operations, monitoring, or audit
MAJEND WATCH
SOC & Monitoring

1
2
3
4
5
6
1
SIEM: Microsoft Sentinel, Wazuh
2
24/7 alerting according to SLA
3
SOC operational layer – triage, containment
4
SOAR playbooks and response automation
5
Infrastructure, network, and cloud monitoring
6
Observability: Prometheus, Grafana, APM
WATCH detects and escalates. Deep forensics is handled by SHIELD.
Clear division of responsibilities
Each division has a clearly defined area of responsibility. Overlaps are intentionally eliminated to prevent conflicts of interest.
Who we work for
SMB & Mid-market
Scalable services without the need for an in-house IT department
Enterprise
Comprehensive coverage for large organizations with high demands
Regulated sectors (NIS2 - ZoKB, TISAX, DORA)
Specialization for organizations subject to regulatory requirements
Public sector & education
Experience with public institutions and educational organizations
Typical use cases
01
NIS2 compliance journey
Gap analysis, remediation roadmap, governance framework, and ongoing compliance monitoring.
02
SOC & MDR rollout
Deployment of SIEM (Sentinel/Wazuh), 24/7 alerting, SOC operations, and SOAR automation.
03
Secure M365 transformation
Migration, governance, Intune, Entra ID, security hardening, and Copilot integration.
04
IT consolidation under one partner
Takeover of operations, helpdesk, infrastructure, and security – one partner, clear accountability.
Why customers choose MAJEND
One partner, clear accountability
The customer does not communicate with five vendors. Everything is under one roof with defined SLAs and escalation paths.
No vendor lock-in
A modular approach allows the customer to use only the services they need, and to adjust the scope at any time.
Security-first mindset
Security is not an add-on - it is built into every division as a separate discipline with dedicated teams.
Scalability from SMB to enterprise
The same partner supports the customer from the first steps all the way to a fully regulated enterprise environment.
MAJEND in one sentence
MAJEND is a security and technology partner that designs, operates, monitors, and verifies IT and cybersecurity—systematically and without compromise.
12
Specialized divisions
Each with clearly defined expertise
1
Partner
One contact for the entire IT and security lifecycle
0
Conflicts of interest
Audit ≠ implementation, monitoring ≠ forensics
Let's talk
CTO & Co-owner | Microsoft Solutions Partner | Making IT work quietly, securely, and with AI | 13+ years in IT & Cybersecurity
"I’m not a fan of fancy buzzwords. I believe IT should just work – quietly in the background, making life easier and letting you focus on what really matters. If you’re looking for someone who talks straight, moves fast, and cares about real results, let’s talk."
michael.hruzek@majend.com | +420 778 778 051

We are ready to start working together. We offer concrete first steps with no obligation.
Security Maturity Assessment
Evaluation of the current security level and identification of priorities
NIS2 Readiness Workshop
A practical workshop for management to understand obligations and next steps
IT Consolidation Analysis
Overview of the existing environment and a proposal for optimization under one partner

Contact us and arrange a free introductory consultation. MAJEND – systematically and without compromise.