Alignment ISO 27001 (ISO standard for information security), physical, perimeter security, vulnerability analysis, ethical hacking, hardening, implementation of measures to fill gaps and mitigate risks.
CONTINGENCY PLAN
Analysis and advice, disaster recovery plan (DRP), procedures, plans and data protection mechanisms for high availability.
INFRASTRUCTURE AND NETWORKING
Advice on sizing, design and procurement of infrastructure data centers, servers, platforms, communications, networks, user equipment, outsourcing by housing, hosting, cloud.
TURNKEY SERVICES
Internet Servers, email, VPNs, proxies, domain controllers, firewalls, monitoring.
SOFTWARE DEVELOPMENT
Outsourcing for the development of custom systems (desktop, web, mobile), advice on methodologies and best practices for software factory.
CONSULTING AND COUNSELING
ICT management, organizational structure, documentation, best practices, policies, monitoring projects, converging technologies, process improvement, use of new technologies.
APPLICATIONS AND TOOLS
Implementation of data warehouse, BPMS (Business process management system - System for managing business processes), CRM (relationship of management of our clients), scanning processes, documentary analysis, web sites, intranets, dashboards, systems management information.
IT AUDIT AND DIAGNOSTICS
Review policies and procedures, compliance levels, best practices in coding software licensing logs.
INFORMATION SECURITY
Given that information technology and the stored and processed data involved are an important element in any organization, our solutions are designed considering (to the extent possible) the 3 pillars of information security:
1
CONFIDENTIAL
Protect the information stored in our company. It can only be viewed by those who are authorized.
2
COMPLETE
The information must be accurate, it cannot be modified without the necessary approvals.
3
AVAILABLE
The information must be available when we need it for our process flow.
=
DATA
A very important asset that must be protected. Fulfilling these points we safeguard our information.