This service allows the client to have a pool of expert consultant hours at their disposal, which can be used according to their needs or priorities for the execution of:
- Data Recovery
- Vulnerability Analysis
- Policy Analysis
- Social Engineering (Calling and Mailing)
- Pentesting
- Gap Analysis
- Risk analysis of a process
- Virtual Platform Training