We have a team of experts specialized in helping organizations fight cyberattacks. We can offer the global services you need, our international network has 300 offices in over 100 countries.
Global evaluation of risks
Evaluation of those business areas most significant for your organizations such as: systems, functions, personnel, cibersecurity, legal, etc., with a coral view of the whole business, its activities and day to day operations, the board of directors and the managers of each of the business areas to be evaluated.
Evaluation of risks of internal control: protection of key assets
Based on the analysis and detection of key assets which protection is critical for the survival of the business and the valuation of the existing protection systems.
Cyber security risk analysis
Identification, protection, detection, response and recovery of cyber security risks that includes the valuation of all areas of information management and protection of assets, devices, applications, personnel, communications and so on.
Including the implementation of the ISO 27001 norm of Management of Systems of Information Security (MSIS) if the client is interested in this certification.
Implementation of the cloud
To secure control of your business data by controlling users and the data storaged (encryptation, deletion of denied access, etc.), offers greater information security against cyber attacks, and increases the volume of data to be shared in a more efficient way.
Protection and privacity of data: LODP, RGLOPD, LSSI
Analysis, diagnosis, and evaluation of risks because data privacy and protection is getting increasingly complex, mostly since the approval of the New Regulations of the Data Protection Law (LOPD-Spanish acronym) that will be enforced from next March 2018, above the existing LOPD and the Information Society and Electronic Commerce Law (LSSI-Spanish acronym)
Control and protection of documents: criptography and authentification
To protect documents independently of where they are storaged.
It allows to share them in an easy and secure way in any device, network or cloud.