top of page

Cyber Checkup®

25 YEARS OF EXPERIENCE IN CYBERSECURITY
Our ethical hacking practices are based on internationally recognized industry standards, mainly those associated with OWASP, OSSTMM.
Our recommendations are aimed, although at correcting technical vulnerabilities, at implementing controls or improving their effectiveness.
The different phases that make up the service are:
Recognition - Scan
Exploitation
Post-Exploitation - Report
CYBER SECURITY SERVICES

REACT
Incident Handling
Forensics

DISCOVER
-
External
-
Internal
-
Code auditing
-
App & Portal
-
Cis 20

ANSWER
-
Hardening

PREVENT
-
CyberEye
bottom of page