Identity Protection

We protect the complete identity cycle, from the physical part with biometrics identification and access control, to the digital part with identity governance processes, as well as robust authentication, privileged identity control and transaction monitoring.

We provide:

  • Logical and physical identity management, biometric access control to sensitive systems, privileged account management and identity governance.
  • Desktop and mobile biometric authentication, compliance with CNBV/INE.
  • Reading, validation and authentication of identity documents such as passports, INE, professional ID.
  • Multifactor authentication.

Information Protection

We identify sensitive business information, where it is located and who uses it, so it is protected, available and complete. We also help you to comply with protection regulations information.

We provide:

  • Data loss prevention (DLP).
  • Fire Integrity.
  • Compliance (LFPDPPP, GDPR, etc.).
  • Information encryption.
  • Database protection.

Endpoint Protection

We detect, prevent and respond to threats that can cause damage in users’ computers, servers, smartphones, tablets, etc.

We provide:

  • Cybolt Endpoint Protect.
  • Endpoint Detection and response (EDR).
  • Device Management.
  • Antimalware.

Network Security

We provide you with the ability to monitor and prevent attacks within the business network, to act in the event of an attack and to identify all the elements involved.

We provide:

  • Firewalls and new generation IPS.
  • Orchestration.
  • Web & email security.
  • Advanced threat detection and response.
  • User behavior analysis (UEBA).

IoT/OT Security

IoT/OT devices interact in industrial, medical, personal processes, etc. We take care of protecting their identities and the continuity of their operations. We also make sure they are not used or accessed by unauthorized third parties.

We provide:

  • ICS visibility.
  • Threat monitoring.
  • Vulnerability management.
  • Change management.

Public Safety

We offer platforms for the protection of citizens, monitoring and attending emergencies, support for investigation and intelligence to combat criminal actions.

We provide:

  • State biometric system (AFIS / ABIS), criminal and civil.
  • Safe city solutions: urban video surveillance, 911 centers, panic buttons, AI, seismic alert.
  • Non-intrusive screening of vehicles, containers, packages, luggage (CT and X-ray inspection).
  • Fixed and mobile arches (vehicle identification, REPUVE scan, photo fines and facial recognition).
  • Identity verification (with passports, INE, driverโ€™s licenses).
  • Technological modernization of prisons.

Corporate Safety

We protect people and facilities, detecting and reporting risks.

We provide:

  • Access control, assistance and credentialing systems.
  • Video surveillance systems, analytical video, heat maps and facial recognition.
  • Peripheral security.
  • CCTV systems: video surveillance, heat maps, face recognition and others.
  • Integration with logical security.
  • Fire control systems.
  • Automation and vehicle access control.
  • Non-intrusive inspection of vehicles, containers, packages, luggage (CT, X-rays).

Back Office & Apps

We protect continuity and ensure the operation of your own, third-parties and commercial applications through the review of their code, pen tests, vulnerability management, database protection, container protection, micro-segmentation, etc., regardless of whether they are Cloud or On-Premise.

We provide:

  • Static and dynamic scan.
  • DevOps security.
  • Hardening.
  • Container security.
  • Monitoring of transactions in web services.
  • Security for APIโ€™s.
  • Vulnerability management.

Cyber-intelligence

We provide visibility to organizations for the identification and management of vulnerabilities and threats, based on information from open sources (Open Source Intelligence / OSINT).

We provide:

  • Best-in-class digital risk protection, platforms.
  • Phishing detection and takedown.
  • Attack surface monitoring.
  • Threat intelligence and threat hunting.
  • Data intelligence: big data & machine learning.
  • Advanced link analytics.
  • Geospatial investigation.

Managed Services

We help you reduce costs, keep your organization safe and streamline processes with end-to-end attention.

How do we do that?

  • Through monitoring that identifies and prevents attacks and threats that may pose a risk to your assets.
  • Performing configuration tasks, parameterization and changes in the policies and operating rules of the technologies you entrust to us.
  • Making sure that the infrastructure entrusted to us has the latest levels of updating to ensure proper functioning.
  • Providing the necessary support to solve problems of operation of your security tools or during a contingency acting in coordination with the support team of the manufacturer.

We provide:

  • ISOC.
  • Device management.
  • We ensure that the infrastructure entrusted to us has the latest levels of updating to ensure proper functioning.
  • Data intelligence.

Business Resilience

We offer resilience and compliance services based on ISO22301, with technology-based results but focused on the operation of your company.

How do we do that?

  • Alternate working positions always available, without deployment waiting time.
  • More than 6,000 m2 of world-class facilities located in an area evaluated as low risk by Mexicoโ€™s National Centre of Disaster Prevention (CENAPRED).
  • Certified data center.ย 
  • DRP as a service with guarantee of RPO and operational RTO.
  • World-class magnetic media storage vaults.
  • Backup as a service located within national territory and with delivery service in physical environment.

Integral Risk Management and Visibility

We help the business identify risks that may affect them through advisory services, we support their mitigation through technology and good practices, and we present their status through systematized dashboards.

How do we do that?

  • Governance, Risk and Compliance (GRC) and comprehensive risk management.
  • Security awareness.
  • Business Impact Analysis (BIA) and risk analysis.
  • Regulatory compliance (ISO, PCI, GDPR, CNBV, etc).
  • Ethical/Pentest hacking and vulnerability management.
  • Development and implementation of Business Continuity Plan (BCP).
Top