IT Security

icon-08.png

Security Analysis

We test the integrity, availability and confidentiality of your company’s information to identify risks, and establish the right controls to reduce or stop damage, financial and administrative losses.

icon-03.png

Ethical Hacking

We evaluate the technological infrastructure of your company, with the purpose of identifying security weaknesses which may permit invasion, theft, alteration or any other criminal activity that may be done against your confidential information. Our goal is to develop corrective actions.

icon-01.png

Monitoring Database

We implement a solution for auditing databases ORACLE and SQL to ensure compliance with internal standards and regulatory requirements (PCI-DSS, SOX, HIPAA, FFIEC and many others), easy to deploy anywhere without overload to the database.

icon-04.png

SOC (Security Operation Center)

We provide SOC services, for a lower cost than in house. Through outsourcing, we manage and supervise remotely the security of your servers, firewalls, antivirus, Intrusion Detection Systems, web traffic, bandwith & back ups.

icon-05.png

Security Training

We strengthen your company’s human resources in different areas of information security: certification degrees, technology training courses for professionals, informational sessions for managers and courses for non-specialist users in the below fields:

• Internal Audit in ISO 27001.
• Risk Management Analysis.
• Development of secure software.
• Online Security.

icon-06.png

Code Verification

We can detect any security weaknesses in existing apps, regardless of being web, client server, or a program language. We can then determine the necessary solutions.

icon-07.png

Security Outsourcing

We have an ample group of specialized professionals for all your outsourcing needs; risk, business & security management, as well as incident reports, ethical hacking proofs and forensic analysis.

icon-02.png

DLP (Data Loss Prevention)