Top

CYBERSECURITY

The evolution towards a knowledge-based society has decisively transformed the interactions among clients, corporations and governments, consolidating the transition to the Information Society.

 

There has also been a groundbreaking Revolution in Communication and Data Technology: Cloud Computing, Mobile Technology, Social Media, E-commerce, Big Data, Internet of Things, online reputation, etc. They all have brought an exponential growth in terms of available information and its segmentation.

Information is Power

Now, more than ever before, information is power and therefore, the threats and attacks are more powerful and complex while the frequency is exponentially increasing.

 

Any company or organization not protecting its data and information enough, is at serious risk of losing competitiveness and even disappearing.

 

At Nishibi, our experience in cybersecurity for both companies and public institutions is the best guarantee for our clients. We make sure that our clients’ most precious asset (information) is kept safe with our security solutions against the attacks that sooner or later will occur.

 

Firmly based on the CIA paradigm (Confidentiality, Integrity, Accessibility) and the Information Security rules and guidelines included in the ISO27001 standard, we offer up-to-date and personalized solutions for Information Security:

 CONFIDENTIALITY,  INTEGRITY,  ACCESIBILITY

Cybersecurity Consulting

CYBERSECURITY AUDITS

  • Compliance Audits ISO27001/LOPD/LSSICE.
  • Vulnerability Monitoring & Management.
  • Wireless Security.
  • Early Response to Security Events.
  • Risk Analysis.
  • IT Assurance.

CYBERSECURITY MANAGEMENT

  • Security Planning and Policy Development.
  • Contingency and Reboot Planning
  • Consulting for ISO/IEC EN-UNE 17799:2002.
  • Virtualization.
  • Cloud Computing.
  • Firewall, Antivirus, Antispam, Intruder Detection System (IDS)
  • Virtual Private Network (VPN).
  • Contents and Destination Control

CERTIFICATION

  • Cryptography and Cryptographic Devices.
  • PKI Infrastructure.
  • Digital Signature and Certification.
  • Electronic Notarization.
  • TimeStamping.

TRAINING SERVICES

  • Personalized courses and training in Cybersecurity and secure practices.
  • Seminars/Conferences.
  • Preparation and establishment of Cybersecurity Policies.