We use our own and third-party cookies to offer you a better browsing experience and personalized attention. If you continue browsing, we will understand that you accept the use of cookies on our site. If you want more information or modify the use of cookies, please read our cookies policy.

Control of risks and threats


We have a team of experts specialized in helping organizations fight cyberattacks. We can offer the global services you need, our international network has 300 offices in over 100 countries.

Services logo

We offer

Evaluation of those business areas most significant for your organizations such as: systems, functions, personnel, cibersecurity, legal, etc., with a coral view of the whole business, its activities and day to day operations, the board of directors and the managers of each of the business areas to be evaluated.

Based on the analysis and detection of key assets which protection is critical for the survival of the business and the valuation of the existing protection systems.

Identification, protection, detection, response and recovery of cyber security risks that includes the valuation of all areas of information management and protection of assets, devices, applications, personnel, communications and so on.

Including the implementation of the ISO 27001 norm of Management of Systems of Information Security (MSIS) if the client is interested in this certification.


To secure control of your business data by controlling users and the data storaged (encryptation, deletion of denied access, etc.), offers greater information security against cyber attacks, and increases the volume of data to be shared in a more efficient way.


Analysis, diagnosis, and evaluation of risks because data privacy and protection is getting increasingly complex, mostly since the approval of the New Regulations of the Data Protection Law (LOPD-Spanish acronym) that will be enforced from next March 2018, above the existing LOPD and the Information Society and Electronic Commerce Law (LSSI-Spanish acronym)


To protect documents independently of where they are storaged.

It allows to share them in an easy and secure way in any device, network or cloud.