Perguntas Frequentes
Tem perguntas? Encontre a resposta nas perguntas mais frequentes ou preencha o formulário.
What does level 2 consist of?

This level delivers to the customer, a real-time monitoring, management, and control of their organization's security, with clear visibility of internal and external risks against computer attacks, carried out under different vectors. Here, the organization is prepared to ensure compliance with international security standards, with an efficient and effective control of threats, through the adoption of response mechanisms to security incidents up to tier 2.

How it works?

Execution of security audit services based on controls of the main security standards, according to the organization's business (IT, IoT, OT, …), as well as analysis of vulnerabilities and injection of security incidents, with injection of zero-day/zero-hour exploits, to applications, ports, services, protocols, databases into infrastructure & cloud, web, mobile, Wi-Fi under methodologies black-box, gray-box and white-box. In addition, this level is complemented with response capabilities against security incidents, ensuring the correlation, detection and correction/mitigation of attacks against botnets, DDoS, fuzzing, trojans, ransomware, phishing and its aspects, social engineering attacks, mobile malware and widespread malware.

What services are part of this level?

These are the services that are part of this level of Cyber Effect:

  • Cyber Security Pentest Service
  • Cyber Security Code Review Service
  • Cyber Security Incident Management Service
  • PCI-DSS & PA-DSS Services
  • Security Certificate Service - PKI
Solicitar Proposta
Entraremos em contacto assim que possível.
* Campo Obrigatório
Como podemos ajudar?
Fale Connosco