We analyze and collaborate in your business advising and implementing successful strategies.
[ CONSULTANCY OF POLICIES, REGULATIONS AND BEST PRACTICES ]
WHAT DO WE DO?
- We identify risks by prioritizing your investments and selecting the most appropriate technologies for the entire organization.
- We apply well-known and proven methodologies and good practices in security management.
- We minimize the costs of your investment in terms of security.
- We maximize the efficiency in the realization of your projects.
- We analyze risks, applications, networks and architecture.
- We implement business continuity plans.
- We carry out consultancies aimed at obtaining ISO 27001 regulations, etc.
- We apply documentary classification policies.
- We have certified personnel such as CISA and CISM by ISACA with a long history in the realization of security consultancies.
[ ACCESS SECURITY ]
UNIQUE ACCESS AND SSO
We solve fractional access
- Centralized authentication.
- Reinforced authentication.
- Single Sign On.
- Accesses’ Audit.
CYCLE OF LIFE IDENTITIES
We manage users’ identities
- Synchronization of attributes.
- Identity life cycle.
- Role life cycle.
- Risk management.
- Audit and recommendations.
We identify users’ identity
- Federation of identities between different domains.
- Federated SSO.
[ DATA SECURITY ]
IRM – Prot-On
- It protects the information and the contents of the users.
- It allows you to define and know who, how and when you have access.
- Regardless of the location of the file and the number of copies.
- Applicable in any environment (PC, mobile, Cloud Computing …).
- Traffic analysis and end point in real time.
- Multiple actions such as: register, block, quarantine.
- Specific databases.
- Watermarks’ detection.
- BD encryption.
- Data masking.
- Control of access and roles.
- Database Firewall.
- Audit, forensic analysis and monitoring
- Multi-platform solution.
- Allows onboarding of new clients.
- Multisining and electronic signature.
- Alerts, reports and dashboards.
[ PERIMETER SAFETY ]
ANTI DDOS SYSTEMS
- Overload of the ICT infrastructure.
- Network communication Botnerts.
- Protection against volumetric attacks.
- Inactivity of web applications, DNS, NTP, etc.
- Protection against attacks.
ADVANCED FIREWALL SOLUTIONS
- Access firewall and applications.
- Quality of service (granularity of communications).
- Multiple AV, IPS and Antispam services.
- Real time protection.
- Multiple platforms of a general and specific nature.
SECURE REMOTE COMMUNICATIONS
- Design of virtual private networks on IPsec / SSL and MPLS technologies.
- AAA platform and user control.
- Double authentication factor and OTP networks.
SECURITY IN THE POST
- Firewall post.
[ SURVEILLANCE AND AUDIT]
PROOF OF INTRUSION
- Search for vulnerabilities.
- Cross Site Scripting.
- SQL Injection.
- Buffer Overflow.
- Malformation of parameters.
- Social engineering.
- Evidence acquisition and analysis.
- Information recovery.
- Verification or refutation of hypotheses related to computer crimes.
- Analysis of network traffic.
[ MONITORING ]
- Fraud detection.
- Attack detection.
- Virus detection, Trojans.
- Status of the vulnerability of hosts and servers.
- Detection of anomalous traffic (for example, traffic without signature).
- Traffic verification (should it be in the network?).
- Detection of susceptible assets in the different types of attacks.
- Black and white lists.
- Policy violations.
- DoS attacks.
- Hybrid attacks.