Checkup | Cyberpeace
top of page

Cyber Checkup®

icon-2.png

25 YEARS OF EXPERIENCE IN CYBERSECURITY

​

 

Our ethical hacking practices are based on internationally recognized industry standards, mainly those associated with OWASP, OSSTMM.

​

Our recommendations are aimed, although at correcting technical vulnerabilities, at implementing controls or improving their effectiveness.

​

The different phases that make up the service are:

Recognition - Scan

Exploitation

Post-Exploitation - Report

CYBER SECURITY SERVICES

Help button icon
REACT
  • Incident Handling

  • Forensics

vinoculars icon
DISCOVER
  • External

  • internal

  • Code auditing

  • App & Portal

  • Cis 20

pencil icon
ANSWER
  • hardening

shield icon
PREVENT
  • cyber eye

NEED HELP?

CONTACT AN ADVISOR

bottom of page