top of page

PROTECT YOUR COMPANY

[s1] Cybersecurity Maturity Assessment  

CMM [NIST, SANS, CIS, Risk Analysis, HLA

[s2] Deployment of Cybersecurity Governance Framework

Policies, Procedures, Incident Response Plans, CSIRTs

[s3] Cybersecurity Learning Program

Workshops, Webinars

[s4] Physical Security Assessment

[s5] TICs Management Analysis

Lifecycles, Support Models

[s6] Infrastructure Security Analysis

Vulnerabilities Assessment,

Surface Analysis

[s7] Platforms Deployment/ Cybersecurity Software

XDR (NGAV, EDR, UBA, NTA) SINGLE SIGN ON, IPS/IDS, ENDPOINTS, SIEM, IAM, DLPs

[s8] Security Analysis of Systems, Applications & Data Bases

Software, Web Services, APIs

[s9] Deployment of the Best Practices Cybersecurity Framework for TICs (BPCF)

[s10] Analysis of Compliance: Standards & Security Regulations

ISOs, PCI-DSS, HIPAA, GDPR, SOX, PHI, PII, Ley #8968 (CR)

[s11] Business Continuity Plan (BCP & DRP)

[s12] Consulting & Assistance for IT projects

nb31.png

Cybersecurity 

Assessment for your Organization

Throughout an Organizational Maturity Evaluation Model

+

Risk analysis

j80.png

Vulnerabilities Assessment &

PenTesting

Whether you need a PenTesting report for a server, for a particular project, or the implementation of a cycle of vulnerability analysis for all your computers

g67.png

Learning Program & Strategy for Awareness

Throughout Training, Workshops and Talks we build with you an organizational culture of Cybersecurity

hv45.png

AGILE Methodology for Project Management

Throughout Workshops and Talks we teach you how to use SCRUM to manage the tasks and projects for your organization

h87.png

Cybersecurity Analysis for Databases and Applications

Throughout an analysis in the applications we analyze the components, inputs, outputs, database, dependencies, interrelations (API), among others

lz1.png

Business Process Analysis

We help you to make a TuneUp of critical business processes, from the perspective of our consultants, with extensive experience in the field of management and technology

cyber-security.png

Cybersecurity Framework

Throughout 3 phases, we group different categories and controls to ensure your entire technological ecosystem

v6.png

e-Commerce Platforms

We advise you on the implementation of

e-commerce solutions and payment methods

bottom of page