Choose your continuous support plan

We work hand in hand with you to constantly protect your company’s digital assets.

Our team of highly trained cybersecurity experts will provide you with comprehensive and continuous protection. From the moment you trust us, we will establish a strong defense for your technological infrastructure by implementing advanced and customized security measures according to your unique needs and characteristics.

Our continuous cybersecurity support service goes beyond simply installing standard security software. We proactively monitor your servers, networks, or websites, identifying potential vulnerabilities and taking swift action to mitigate any potential threats. Additionally, we perform regular security updates to ensure protection against the latest vulnerabilities and cyber attacks.

IT audit/IT review

We conduct a thorough review of the architecture of the technological infrastructure to identify potential risks and opportunities for improvement, with the goal of ensuring the confidentiality, integrity, and availability of information.

Continuous security recommendations

We perform continuous reviews of known vulnerabilities on the company’s information systems and provide a series of recommendations to mitigate risks as quickly as possible in order to prevent information security breaches.

Auditing log monitoring

We install intrusion detection controls and event management, if necessary, or configure vendor solutions to identify potential intruders or security control failures in real-time. This allows us to promptly detect any unauthorized access or security breaches.

Vulnerability analysis

We diagnose the current state of the equipment that is part of the technological infrastructure and provide guidance to improve security practices.

Pentesting

We simulate the scenario of a real attack from the internet by conducting tests within the system, both as an external attacker and as an authenticated attacker within the application attempting to elevate privileges.

Trainings

Cybersecurity trainings help protect the company’s information. By educating employees about best security practices, the risk of information theft or compromise is reduced, and it helps prevent cyber attacks.

Computer forensic analysis

Through advanced techniques and specialized tools, we identify relevant digital evidence, ensuring integrity and chain of custody. We then proceed to analyze the data for relevant evidence, reconstructing events, and identifying suspicious or malicious activities.

Red Teaming

We conduct simulation of advanced and targeted threats such as spear phishing, malware attacks with antivirus evasion techniques, post-exploitation techniques, physical hacking, and attacks on wireless infrastructure.

Software audit

We conduct an evaluation process aimed at identifying security and compliance issues in an organization’s software. This is done through a manual or automated review of the software’s source code.

Installation, configuration, and administration of security controls

We implement measures to protect a system or network from cyber attacks, including:
• Antivirus software.
• Backup solutions.
• Multi-factor authentication.

Incident response

The incident response team can identify and address security issues before they escalate into major incidents. They can minimize the impact on the organization and reduce downtime.

Keeping your information secure is an ongoing process.

And we take care of providing you with plans that fit your company in order to protect your data and information.

Reliable

Secure

Adaptable

Certified

Start today with plans starting from $1,000,000 COP per month.

Which plan best suits your needs?

You can also customize your plan with the services that you consider best suit your company.

Start-Up Plan

  • IT Review
  • Security recommendations
  • Weekly monitoring
  • Pentesting
  • One training per year
  • Service Level Agreement (Response time of 1 day)
  • Security controls
  • Two incident responses per year

SME Plan

  • Includes everything from the Start Up plan
  • Continuous automated monitoring
  • Vulnerability analysis
  • Two training sessions per year
  • Three incident responses per year
  • Computer forensic analysis
  • Service Level Agreement (Response time of 8 hours)

Enterprise Plan

  • Includes everything from the Business plan
  • Three trainings per year
  • Red Teaming (Simulation of real attack)
  • Software audit
  • Four incident responses per year
  • Service Level Agreement (Response time of 2 hours)