CHOOSE YOUR OBJECTIVE

IT Strategic plans

We develop consultancies for the effective development of Strategic Plans for Information and Communication Technologies, based on innovation and based on the realities of the business, sector, regulations and conditions existing in the organization.

CONTACT
Cybersecurity Training

We strengthen the competencies of your employees, at the managerial level as an operational, in computer security through diplomas, courses, trainings, talks on topics such as:

• Network security
• Secure software development
• Risk analysis
• Audit in ISO 27001
• Computer forensics analysis
• IPv6 diagnosis and implementation

CONTACT
Business continuity plans

We support organizations in identifying and defining strategies to continue the operation and reduce the impact to the business, in the event of an emergency or disaster.

CONTACT
Protection of Data Compliances

We implement comprehensive management plans for compliance with the Personal Data Protection Regime providing comprehensive support against the current challenges posed by information and ICT management, specializing in protection privacy, privacy, good name and information security.

CONTACT
Cybersecurity Professionals

We make available to your company, under outsourcing, specialized professionals to assume roles of risk analysis, business continuity, security officer, incident management, ethical hacking tests, forensic analysis between Other.

CONTACT
ISO27001 advisory

We support and accompany the implementation and certification of your Information Security Management System (ISMS), based on ISO 27001. Gain proven, certified capacity to manage an outage and provide market confidence in your services.

CONTACT
Computer forensics analysis

We define and identify the sources, digital evidence and actions to be taken in the face of a computer incident or suspected crime.

CONTACT
IPv6 diagnosis and implementation

We diagnose, implement, migrate and monitor the entire technological infrastructure for operation in IPv6, taking into account compliance with digital government regulations.

CONTACT
1
Previous
Next
1
Previous
Next
1
Previous
Next