Compliance & Risk Management Complete lifecycle of security standards and best practices implementation: gap analysis, compliance assessment, planning, deployment, audit and continuous improvement. Security and compliance dashboards, KPI, Balanced Scorecard. Covering ISMS (ISO27001), BCM (ISO22301), Data Privacy/PII, PCI-DSS among others.
+ |
Network, Systems & Identity Security Design, deployment, administration and support of secure networks and systems protection solutions. Product assessment and Benchmarking. Security architecture and technical advice on security platforms (concerning perimeter, endpoints, databases and/or systems), identity and access management (IAM), mobility (MDM) and DLP and IRM.
+ |
Security Monitoring & Incident Response / Entelgy CSIRT Design and deployment of security monitoring solutions (SIEM/Big Data). Managed services, incident response and coordination through our Entelgy CSIRT. Advice and support for developing CERT/CSIRT capabilities. Forensics and malware analysis. Remote and on-site incident management support.
+ |
Advanced Penetration Testing & Vulnerability Management Complete vulnerability management lifecycle. Ethical hacking services for web and client-server applications, mobile Apps, networks, infrastructures and systems. Specific analysis of source code, social engineering and DDoS. Advanced penetration tests using the Red Team methodology combining different scenarios and attack vectors.
+ |
Fraud Prevention & Response On-line fraud threats (phishing, spearphishing, pharming, malware, fraudulent mails and customer credential markets): automatic and proactive detection, analysis and management of closures. On-demand analysis of targeted and specific malware. Reports on trends and fraud intelligence.
+ |
Brand Protection & Social Media Security Detection and investigation of threats relating to theft and publication of sensitive information, hacktivism, brand abuse, fraudulent marketing, piracy, industrial property theft, corporate and executive identity theft or impersonation. Personalised periodic reports and warnings concerning relevant decision-making events.
+ |
Industrial Control Systems Security Adapting to specific rules for protecting critical infrastructures. Analysis and detection of risks and threats in Industrial Control Systems (ICS) and other essential infrastructures. Specific solutions to protect control networks in managed or dedicated mode for the organisation.
+ |