Security Services2018-09-20T13:07:07+01:00

Security Services

We analyze and collaborate in your business advising and implementing successful strategies.

[ CONSULTANCY OF POLICIES, REGULATIONS AND BEST PRACTICES ]

WHAT DO WE DO?

  • We identify risks by prioritizing your investments and selecting the most appropriate technologies for the entire organization.
  • We apply well-known and proven methodologies and good practices in security management.
  • We minimize the costs of your investment in terms of security.
  • We maximize the efficiency in the realization of your projects.
  • We analyze risks, applications, networks and architecture.
  • We implement business continuity plans.
  • We carry out consultancies aimed at obtaining ISO 27001 regulations, etc.
  • We apply documentary classification policies.
  • We have certified personnel such as CISA and CISM by ISACA with a long history in the realization of security consultancies.

[ ACCESS SECURITY ]

UNIQUE ACCESS AND SSO


We solve fractional access

  • Centralized authentication.
  • Reinforced authentication.
  • Single Sign On.
  • Accesses’ Audit.

CYCLE OF LIFE IDENTITIES


We manage users’ identities

  • Synchronization of attributes.
  • Identity life cycle.
  • Role life cycle.
  • Risk management.
  • Audit and recommendations.

FEDERAL IDENTITIES


We identify users’ identity

  • Federation of identities between different domains.
  • Federated SSO.
  • Network.

[ DATA SECURITY ]

IRM – Prot-On


  • It protects the information and the contents of the users.
  • It allows you to define and know who, how and when you have access.
  • Regardless of the location of the file and the number of copies.
  • Applicable in any environment (PC, mobile, Cloud Computing …).

DLP


  • Traffic analysis and end point in real time.
  • Multiple actions such as: register, block, quarantine.
  • Specific databases.
  • Watermarks’ detection.

DB PROTECTION


  • BD encryption.
  • Data masking.
  • Control of access and roles.
  • Database Firewall.
  • Audit, forensic analysis and monitoring

ELECTRONIC SIGNATURE


  • Multi-platform solution.
  • Allows onboarding of new clients.
  • Multisining and electronic signature.
  • Alerts, reports and dashboards.

[ PERIMETER SAFETY ]

ANTI DDOS SYSTEMS


  • Overload of the ICT infrastructure.
  • Network communication Botnerts.
  • Protection against volumetric attacks.
  • Inactivity of web applications, DNS, NTP, etc.
  • Protection against attacks.

ADVANCED FIREWALL SOLUTIONS


  • Access firewall and applications.
  • Quality of service (granularity of communications).
  • Multiple AV, IPS and Antispam services.
  • Real time protection.
  • Multiple platforms of a general and specific nature.

SECURE REMOTE COMMUNICATIONS


  • Design of virtual private networks on IPsec / SSL and MPLS technologies.
  • AAA platform and user control.
  • Double authentication factor and OTP networks.

SECURITY IN THE POST


  • APT.
  • Antivirus.
  • Antimalware.
  • Firewall post.
  • Email.
  • Navigation.

[ SURVEILLANCE AND AUDIT]

PROOF OF INTRUSION


  • Search for vulnerabilities.
  • Cross Site Scripting.
  • SQL Injection.
  • Buffer Overflow.
  • Malformation of parameters.
  • Social engineering.

FORENSIC ANALYSIS


  • Evidence acquisition and analysis.
  • Information recovery.
  • Verification or refutation of hypotheses related to computer crimes.
  • Analysis of network traffic.

[ MONITORING ]

  • Fraud detection.
  • Attack detection.
  • Virus detection, Trojans.
  • Status of the vulnerability of hosts and servers.
  • Detection of anomalous traffic (for example, traffic without signature).
  • Traffic verification (should it be in the network?).
  • Detection of susceptible assets in the different types of attacks.
  • Black and white lists.
  • Policy violations.
  • DoS attacks.
  • Hybrid attacks.

Partners

Grupo CMC