SECURITY ASSESSMENT


  • TECHNICAL AUDITS
  • PEOPLE
  • PHYSICAL
  • PROCESS
  • Ethical Hacking & Penetration Test
  • External and Internal Security
  • VPN
  • Web Applications (Black Box and White Box)
  • Code Audits
  • Network Architecture
  • Mobility Environments
  • Securing devices
  • WorkStation (Hits, Climbing privileges, UserDB, shares ...)
  • Virtualization (Servers, Desktop, Networks)
  • Background Checks, Reputational Restoration, Social Engineering Test by highly qualified personnel, to obtain sensitive information, credentials, unlawful creation of users, etc..

    • Search of public records
    • Forums and Social Networking
    • User Support Center
    • Spear Phishing
    • Using decoy devices infected with malicious code
    • Training sessions and awareness at all levels

    Supported by the standard TIA-942:2005 and ISO 27002, as well as the current adjustment we will audit:

    • Conditioning
    • Intruder alarm systems
    • Unauthorized physical connection to the networks
    • Recording and Monitoring Systems
    • Electrical, SAIS and Generators
    • Communications
    • Environmental Control
    • Energy Efficiency

    Our services are designed to ensure compliance with legislation, regulations and applicable security standards.

    • Preparation of the regulatory body of information security.
    • Defining an Awareness Plan.
    • Risk analysis.
    • Computer Contingency Plan.
    • Business Continuity Plan.
    • Comprehensive Security Plan.