Select your language


Our commitment to innovation and our professionals’ high level of specialisation shape a full range of cyber-security services and solutions intended to cover all our clients’ needs.

smartsoc SmartSOC
Advanced Security Operations Center

Cybersecurity Intelligence
Using the most advanced technology, our multidisciplinary group of security experts provides best-in-class services to protect your organization against cyber-threats.

Red Team Services Red Team Services

We think like your enemy
Our highly qualified team performs multiple tests and assesses risks of intrusion, simulating controlled cyber and physical attacks that may affect your organization.


1Compliance & Risk Management
Complete lifecycle of security standards and best practices implementation: gap analysis, compliance assessment, planning, deployment, audit and continuous improvement. Security and compliance dashboards, KPI, Balanced Scorecard. Covering ISMS (ISO27001), BCM (ISO22301), Data Privacy/PII, PCI-DSS among others.


2Network, Systems & Identity Security
Design, deployment, administration and support of secure networks and systems protection solutions. Product assessment and Benchmarking. Security architecture and technical advice on security platforms (concerning perimeter, endpoints, databases and/or systems), identity and access management (IAM), mobility (MDM) and DLP and IRM.


3Security Monitoring & Incident Response / Entelgy CSIRT
Design and deployment of security monitoring solutions (SIEM/Big Data). Managed services, incident response and coordination through our Entelgy CSIRT. Advice and support for developing CERT/CSIRT capabilities. Forensics and malware analysis. Remote and on-site incident management support.


4Advanced Penetration Testing & Vulnerability Management
Complete vulnerability management lifecycle. Ethical hacking services for web and client-server applications, mobile Apps, networks, infrastructures and systems. Specific analysis of source code, social engineering and DDoS. Advanced penetration tests using the Red Team methodology combining different scenarios and attack vectors.


5Fraud Prevention & Response
On-line fraud threats (phishing, spearphishing, pharming, malware, fraudulent mails and customer credential markets): automatic and proactive detection, analysis and management of closures. On-demand analysis of targeted and specific malware. Reports on trends and fraud intelligence.


6Brand Protection & Social Media Security
Detection and investigation of threats relating to theft and publication of sensitive information, hacktivism, brand abuse, fraudulent marketing, piracy, industrial property theft, corporate and executive identity theft or impersonation. Personalised periodic reports and warnings concerning relevant decision-making events.


7Industrial Control Systems Security
Adapting to specific rules for protecting critical infrastructures. Analysis and detection of risks and threats in Industrial Control Systems (ICS) and other essential infrastructures. Specific solutions to protect control networks in managed or dedicated mode for the organisation.

Certificado de conformidad con el ENS, Innotec System, S.L.U
Logo Certificacion CREST
Certificado CREST
Certificado CREST
Logo Certificacion Microsoft
Logo LEET - Servicios de Consultoría
Logo LEET - Servicios de Monitorización
Red Nacional del SOC