It is a solution for the basic, effective and simple cyber protection of a company. It focuses on protecting the main avenues of intrusion and infection, which are user devices, email and web browsing.
The solution is made up of a series of protection tools, and our monitoring and incident response service.
There are three versions:
An endpoint is any device where a data connection begins or ends. For example, personal computers, smartphones, or servers.
Because they are the attackers' final destination. The goal is to infect the endpoint and remain hidden to carry out their actions. It’s important to continuously ensure that these devices are clean, no matter where they are located.
Yes, our endpoint protection solution allows for a rollback to return the device to its pre-infected state.
The most important thing is not just restoring the data, which could be done with a backup, but understanding the root cause of the infection and discovering the possible persistence mechanism used by the malware to prevent it from reappearing once the data is restored.
Email is currently the main entry point for malware in companies. It is estimated that it is responsible for over 80% of malware infections and more than 98% of phishing attacks. It’s also the primary means of exfiltrating data and confidential information from the company.
It’s one of the most frequently used tools by company staff, who often lack technical knowledge and are unfamiliar with the social engineering techniques attackers use to trick them into doing something, such as clicking where they shouldn’t, entering credentials where they shouldn’t, or making a bank transfer to the wrong account. For this reason, users become a priority target, and defense systems must assume they will be deceived and take measures to contain the intrusion despite user actions.
On the other hand, this protection cannot be too aggressive as it could hinder the users' daily work.
Primarily through three actions:
We offer an initial evaluation at no cost to the company and provide a set of recommendations along with a personalized plan for the company.
Users, without realizing it, become the best allies of cybercriminals when they are tricked into taking certain actions that make it easier for attacks to occur. For this reason, it’s important to equip them with the ability to recognize common scams and social engineering techniques that will be used against them.
Any attack, whether in its infection phase or later stages such as persistence or data exfiltration, will involve some form of web browsing. Whether it’s downloading malware, connecting to a control center, or extracting confidential company information, these browsing activities can be detected and blocked, thereby thwarting attacks at any stage.
Yes, there are databases with millions of categorized URLs on which access policies can be established. These policies can be set to allow, deny, or “educate,” which means allowing access but with a warning to the user to use it in moderation. You can also create custom categories with URLs chosen by the client.
Yes, it can differentiate between them.
Yes, it can also detect protocols such as SSH, RDP, FTP, or Telnet, among many others, regardless of the port they use.
We can decrypt all web browsing traffic and much of the traffic from applications that use the internet.
This law, in its Article 36, specifies that the data controller, the employer, must take the necessary measures in line with the state of the art in technology to ensure, among other things, the confidentiality of the company’s data.
Confidentiality is defined as the ability to demonstrate that the information is accessed or manipulated only by those authorized to do so. Confidentiality is impossible on a device infected with malware since accessing this information is the malware's main objective.
This solution helps you demonstrate that you have implemented reasonable and state-of-the-art measures to ensure the confidentiality of the information your company manages.
These are our monitoring and response services. Cybersecurity tools provide us with visibility into what is happening in your systems so that we can detect and respond early to any threat. To do this, we need people to continuously monitor and operate these tools.