Skip to main content

Security Consulting

Security Consulting

The team of expert security consultants at Internet Security Auditors offers top-level services in consulting across multiple areas of everyday security development: analysis, development and implementation of standards (ISO 2700X, BS 25999, LOPD, SOX, etc.), Risk Analysis (MAGERIT, OCTAVE or CRAMM), development of Security Policies, Security Infrastructure Consulting, Electronic Signature, PKI, Single Sign-on, etc.



Ultimately, all the needs required today in security, always from an objective point of view and with personnel endorsed by the most recognized independent security certifications (CISM, CGEIT, CISSP, CISA, BS7799 Lead Auditor, ITIL, etc.).

 

Scope of Services

The Security Consulting services carried out by Internet Security Auditors cover the following areas:

Security Infrastructure Consulting

Design of secure corporate networks, independent manufacturer assessment regarding the most suitable security infrastructure, installation/configuration of the different elements of the security infrastructure, studies to improve corporate networks regarding Confidentiality, Integrity and Availability parameters of information, etc.

 

Risk Analysis

Basic, Intermediate and Detailed studies using MAGERIT, OCTAVE or CRAMM methodologies, as well as support for Risk Analysis projects.

Security Policy Development

Development and Maintenance of Security Policies, support for the development and implementation of these policies, creation of training and dissemination plans for Security Policies.

 

Contingency and Business Continuity Plans

Design of Contingency and Business Continuity Plans, as well as design of specific recovery plans for anticipated scenarios.

Electronic Signature and PKIs

Consulting in Digital Signature, consulting and design of Public Key Infrastructure (PKIs), and centralization of access control (Single Sign-on).

 

Consulting in Secure Architecture Design

For web applications, application access control, authenticity and confidentiality of information.

 

Forensic Computing

Preparation of technical case reports, as well as recommended countermeasures, preparation of expert reports and defense of these reports in judicial processes.

What Our Clients Say


Do not hesitate to contact us if you need more information

Send us your questions and we will get in touch with you as soon as possible.

CAPTCHA