05
Cybersecurity

We offer different analysis of your company’s security depending on the necessary coverage and according to your needs.

Risk evaluation | Configuration evaluations | Vulnerability evaluations 

Penetration test | Risk evaluation | Formations

The more interconnected digital society is, the more relevant security becomes. The capital concept in this context is cybersecurity, being that online, both companies and individuals are exposed to a vast ammount of dangers which can bring about considerable damage.

That is why cybersecurity is more relevant than ever. This is not only Internet security, but also other aspects y sectors of information and communication technologies.

Taking into account that cyberattacks don’t always take place online, cybersecurity encompasses aspects such as the security protocols of an organization, software development, regulation compliance, audits, physical security, communications, hardware, etc.

Risk evaluation

We analyse all the aspects comprising security such as security policies, business plan continuity, the risks your company may be exposed to, etc. in order to be able to asess real threats and the impact these could have on your business. As such, we then can prioritize said threats and propose a contingency plan against them.

Configuration evaluations

During this analysis, there’s a review of equipment configurations and the elements composing the system, making sure they are all correct. In order to do this, the following are analysed: Net equipment, file servers, web servers, mail servers, DNS servers, routers, firewalls, switches, employees, physical security.

Vulnerability evaluations

For us to perform this type of evaluation we make use of automated tools so we can corroborate any given system’s security level. During this evaluation the following are revised: Administrative accounts, operating system, software, etc.

Penetration test

We analyze all security aspects such as security policies, business plan continuity, the risks your company may be exposed to, etc. in order to be able to asess real threats and the impact these could have on your business. As such, we then can prioritize said threats and propose a contingency plan against them.

Risk evaluation

During this analysis, there’s a review of equipment configurations and the elements composing the system, making sure they are all correct. In order to do this, the following are analysed: Net equipment, file servers, web servers, mail servers, DNS servers, routers, firewalls, switches, employees, physical security.

Formations

For us to perform this type of evaluation we make use of automated tools so we can corroborate any given system’s security level. During this evaluation the following are revised: Administrative accounts, operating system, software, etc.