ISD, Information Security Diagnosis, a Service that helps companies identify the level of security and risk they are in, in order to have a complete picture of information security.

The services provided are:

MRA, Methodology of risk analysis.
CRA, Current risk assessment.
EISMS, Evaluation of ISMS.

CIISMS, Consulting and implmentation of ISMS, a service that supports companies in the process of implementation, review and adjustment in the Information Security Management System.

ISM, Information Security Model, ISMS consultancy that helps identify best practices in the field of information security and development of a security model appropriate to the needs and capabilities of the organization.
MAR, Model Risk Analysis, implementation of an information security risk assessment model based on best practices in the market and adjusted to the needs of the company.

SOCMS, Security Operations Center Model SOC, service oriented to the implementation of an information security operations model, developing the processes, roles and functions for the management of incidents, vulnerabilities, logical monitoring and intelligence of threats according to the needs and capabilities of the company.

The services provided are:

  • IM, Incident management.
  • MV, Management of vulnerabilities.
  • MM, Monitoring Management.
  • TIM, Threat Intelligence Management.

DGS, Definition of Government and Strategy, government implementation and security strategy in the orgnization helping to have clarity and focus on how to manage security.
ISPD, Information Security Policy Definition, advice and support in the definition of information security policies according to the needs and capacities of the company.

AIC, Architecture Information Cybersecurity
SND, Secure Network Design, definition of the appropriate network architecture according to the need of the organization, establishing the best practices, minimizing the risks and improving the perimeter assurance.

SDPS, Security Development Process of Software, consulting in the construction of the process of secure development of applications for the organization, applying good security practices to development allowing control from the start phase to its deployment, minimizing response times, costs, reprocessing, guaranteeing a better final product.

CIPP, Critical Infrastructure Protection Plans, plans for the adequate protection of critical infrastructures, operational models in the different sectors, energy, water, financial, among others.