Esta web utiliza cookies para que podamos ofrecerte la mejor experiencia de usuario posible. La información de las cookies se almacena en tu navegador y realiza funciones tales como reconocerte cuando vuelves a nuestra web o ayudar a nuestro equipo a comprender qué secciones de la web encuentras más interesantes y útiles.
SOC
We offer centralized security services integrating different solutions, mainly the real-time identification of cybersecurity threats through monitoring thanks to a product of our own development, without forgetting to support our clients with a team specialized in incident response and analysis digital forensic.
"Spain is the 3rd country in the world which suffers the most cyber attacks". "2017 was the year when more attacks were registered" (National Security Institute).
50% of small and medium-sized companies have suffered a cyber attack. 70% of attacks are directed at these types of companies. 60% of hacked small and medium businesses go bankrupt six months after an attack. (National Cyber Security Alliance)
Our product combines different tools in a single probe system. This allows us to identify, in real time, possible intrusions on your company's network.
The probes placed in the client (hard and / or soft) detect anomalous network traffic, both in the IT and OT world, reporting the data to our central node, generating alerts for each security incident. Also, deploy "Honey Pots" as bait and diversion for the hacker.
With extensive experience, our team of specialized technicians advises and supports, and may even be part of your team to carry out an analysis of the situation and determine the scope, impact and risks suffered:
- Estimate the scope of the attack and its total elimination
- Minimize impact through containment and recovery protocols
- Proposal for new measures to improve security
When a cyber attack happens, it is necessary to know the information that has been compromised and the damage caused. The digital forensic analysis collects all the possible evidence of the attack by applying techniques of:
- Data analysis
- Analysis and research
- Report writing
They allow to identify, recover, preserve, analyze and present valuable information.