Security Outsourcing

This service allows the client to have a pool of expert consultant hours at their disposal, which can be used according to their needs or priorities for the execution of:

  • Data Recovery
  • Vulnerability Analysis
  • Policy Analysis
  • Social Engineering (Calling and Mailing)
  • Pentesting
  • Gap Analysis
  • Risk analysis of a process
  • Virtual Platform Training