The team of expert security consultants at Internet Security Auditors offers top-level services in consulting across multiple areas of everyday security development: analysis, development and implementation of standards (ISO 2700X, BS 25999, LOPD, SOX, etc.), Risk Analysis (MAGERIT, OCTAVE or CRAMM), development of Security Policies, Security Infrastructure Consulting, Electronic Signature, PKI, Single Sign-on, etc.
Ultimately, all the needs required today in security, always from an objective point of view and with personnel endorsed by the most recognized independent security certifications (CISM, CGEIT, CISSP, CISA, BS7799 Lead Auditor, ITIL, etc.).
The Security Consulting services carried out by Internet Security Auditors cover the following areas:
Security Infrastructure Consulting
Design of secure corporate networks, independent manufacturer assessment regarding the most suitable security infrastructure, installation/configuration of the different elements of the security infrastructure, studies to improve corporate networks regarding Confidentiality, Integrity and Availability parameters of information, etc.
Risk Analysis
Basic, Intermediate and Detailed studies using MAGERIT, OCTAVE or CRAMM methodologies, as well as support for Risk Analysis projects.
Security Policy Development
Development and Maintenance of Security Policies, support for the development and implementation of these policies, creation of training and dissemination plans for Security Policies.
Contingency and Business Continuity Plans
Design of Contingency and Business Continuity Plans, as well as design of specific recovery plans for anticipated scenarios.
Electronic Signature and PKIs
Consulting in Digital Signature, consulting and design of Public Key Infrastructure (PKIs), and centralization of access control (Single Sign-on).
Consulting in Secure Architecture Design
For web applications, application access control, authenticity and confidentiality of information.
Forensic Computing
Preparation of technical case reports, as well as recommended countermeasures, preparation of expert reports and defense of these reports in judicial processes.