top of page
Cyber Checkup®
25 YEARS OF EXPERIENCE IN CYBERSECURITY
Our ethical hacking practices are based on internationally recognized industry standards, mainly those associated with OWASP, OSSTMM.
Our recommendations are aimed, although at correcting technical vulnerabilities, at implementing controls or improving their effectiveness.
The different phases that make up the service are:
Recognition - Scan
Exploitation
Post-Exploitation - Report
CYBER SECURITY SERVICES
REACT
Incident Handling
Forensics
DISCOVER
-
External
-
Internal
-
Code auditing
-
App & Portal
-
Cis 20
ANSWER
-
Hardening
PREVENT
-
CyberEye
bottom of page