Cyber Security
Services & Solutions
(Please click on the theme of your preference to see our products, services and courses.)
PRODUCTS
SERVICES
MANAGED CYBERSECURITY
TRAINING & EDUCATION
PRODUCTS
Close
SERVICES
Close
APPLICATION SECURITY ASSESSMENT PROGRAM (ASAP)
BLUE TEAM
BUSINESS CONTINUITY PLAN (BCP OR BCMS)
BUSINESS IMPACT ANALYSIS (BIA)
CISO AS A SERVICE
CLASSIFICATION OF INFORMATION
CLASSIFICATION OF INFORMATION WORKSHOP
CODE ANALYSIS
CODE ANALYSIS OF WEB SITES/APPLICATIONS
COMPLIANCE CONSULTING WITH PIN SECURITY
COMPLIANCE WITH NATIONAL REGULATIONS
CREATION OF INCIDENT RESPONSE PLANS
DATA RESEARCH
DIGITAL BRAND PROTECTION
DOCUMENTATION OF POLICIES, PROCESSES AND PROCEDURES
ELECTRONIC INVOICE AUDIT (FEL)
EXTERNAL PENETRATION TESTING
EXTERNAL VULNERABILITY ANALYSIS
FIREWALL ASSESSMENT
FORENSIC INVESTIGATION AND ANALYSIS SERVICE
HARDENING GUIDES CREATION
INCIDENT RESPONSE SERVICE
INFORMATION SECURITY STRATEGIC PLAN (ISSP)
EXTERNAL AND INTERNAL PENETRATION TESTING WITH NODEZERO
INTERNAL VULNERABILITY ANALYSIS
ISSP: INFORMATION SECURITY STRATEGIC PLAN
ITIL-BASED CONSULTING
MOBILE APP CODE ANALYSIS
OWASP TALK
PCI DSS COMPLIANCE CONSULTING
PENETRATION TESTING TO WIRELESS NETWORKS
PHYSICAL INSPECTION
PHYSICAL SOCIAL ENGINEERING BY USB
PURPLE TEAM
RED TEAM
REVIEW OF POLICIES, PROCESSES AND PROCEDURES
RISK ANALYSIS
SECURITY ANALYSIS TO MOBILE APPLICATIONS
SECURITY ANALYSIS TO WEB APPLICATIONS
SECURITY AWARENESS PROGRAM
SECURITY OPERATIONS CENTER – MANAGEMENT
SECURITY OPERATIONS CENTER – MONITORING
SISAP’S CYBERSECURITY AND INFORMATION SECURITY PROGRAM
SOCIAL ENGINEERING BY EMAIL (PHISHING)
SOCIAL ENGINEERING BY PHONE CALL (VISHING)
SUPPORT SERVICE IN THE IMPLEMENTATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON ISO 27001
SWIFT CSP COMPLIANCE CONSULTING
TDR CREATION
TECHNOLOGICAL DISASTER RECOVERY PLAN (DRP)
TECHNOLOGICAL RISK QUANTIFICATION X-ANALYTICS
THREAT INTELLIGENCE
VERIZON’S CYBER RISK PROGRAM
VULNERABILITIES ANALYSIS TO WEB SITES/APPLICATIONS
VULNERABILITIES ANALYSIS TO WIRELESS NETWORKS
VULNERABILITY MANAGEMENT PROGRAM (VMP)
WORKSHOP WITH HIGH LEVEL EXECUTIVES
MANAGED CYBERSECURITY
Close
BY CATEGORY:
Policies, Processes and Procedures
Inventory, Classification and Labeling of Information
Environment & Physical
Servers / Mobile & Workstation
Testing & Remediation
- EXTERNAL VULNERABILITY ANALYSIS
- INTERNAL VULNERABILITY ANALYSIS
- EXTERNAL PENETRATION TESTING
- EXTERNAL AND INTERNAL PENETRATION TESTING WITH NODEZERO
- VULNERABILITIES ANALYSIS TO WEB SITES/APPLICATIONS
- VULNERABILITIES ANALYSIS TO WIRELESS NETWORKS
- PENETRATION TESTING TO WIRELESS NETWORKS
- SECURITY ANALYSIS TO MOBILE APPLICATIONS
- CODE ANALYSIS OF WEB SITES/APPLICATIONS
- MOBILE APP CODE ANALYSIS
- FIREWALL ASSESSMENT
- PHYSICAL SOCIAL ENGINEERING BY USB
- SOCIAL ENGINEERING BY PHONE CALL (VISHING)
- SOCIAL ENGINEERING BY EMAIL (PHISHING)
- VOLUME OR STRESS TESTING
- VULNERABILITY MANAGEMENT
Compliance
- COMPLIANCE CONSULTING WITH PCI PIN SECURITY STANDARD
- COMPLIANCE WITH NATIONAL REGULATIONS
- ELECTRONIC INVOICE AUDIT (FEL)
- IMPLEMENTATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON ISO/IEC 27001
- PCI DSS COMPLIANCE CONSULTING
- SWIFT CSP COMPLIANCE CONSULTING
- COMPLIANCE CONSULTING WITH PIN SECURITY
- COMPLIANCE WITH NATIONAL REGULATIONS
Investigation & Forensic Analysis
Solutions Searcher
Enter a keyword to start your search.
Security is not a project, it is a program. To be robust, it must be built from the inside out.
We are leaders in the Information Technology market. Our solutions are intended to achieve secure and reliable information systems.