Cybersecurity
We check the actual state of cybersecurity and the degree of risk to which the company is exposed in terms of confidentiality, integrity and availability. To do this, we consider a preventive, detective and corrective perspective that allows us to deal with any contingency that may occur.
Vulnerability analysis
- Analysis of the level of protection of computer equipment, level of patching, software versions, and additional tasks necessary for proper maintenance.
Diagnosis / audit
- We evaluate all those rules, controls, procedures and technical measures involved in the security of a company's information systems. This includes both the technical means involved in such security, as well as the human means used to implement the measures.
Bastionado
- Implementation of the necessary technical and organizational measures to reduce the vulnerability of computer equipment to external attacks, illegitimate access, malware, etc.
Penetration testing / Pentesting
- We perform a controlled cyber-attack to check the existing vulnerabilities in the applications and computer networks and find out how the defense mechanisms behave, identifying possible vulnerabilities.
Government
- The strategy adopted in relation to cybersecurity and the measures and controls defined to manage its risks are evaluated.
Incident response
- The established contingency measures are reviewed and any additional measures that may be necessary are recommended in order to be able to restore IT services in the event of any cybersecurity incident.
Training
- We provide cybersecurity training tailored to your needs.
Our value proposition
When valuing a company, it is essential to understand what valuation objective exists and, consequently, we will apply the most appropriate method for each case.

Contact with us
Send us your inquiry and our team of experts will assist you as soon as possible.