Got questions? Find the answer in the frequently asked questions or fill in the form.
What does level 2 consist of?

This level delivers to the customer, a real-time monitoring, management, and control of their organization's security, with clear visibility of internal and external risks against computer attacks, carried out under different vectors. Here, the organization is prepared to ensure compliance with international security standards, with an efficient and effective control of threats, through the adoption of response mechanisms to security incidents up to tier 2.

How it works?

Execution of security audit services based on controls of the main security standards, according to the organization's business (IT, IoT, OT, …), as well as analysis of vulnerabilities and injection of security incidents, with injection of zero-day/zero-hour exploits, to applications, ports, services, protocols, databases into infrastructure & cloud, web, mobile, Wi-Fi under methodologies black-box, gray-box and white-box. In addition, this level is complemented with response capabilities against security incidents, ensuring the correlation, detection and correction/mitigation of attacks against botnets, DDoS, fuzzing, trojans, ransomware, phishing and its aspects, social engineering attacks, mobile malware and widespread malware.

What services are part of this level?

These are the services that are part of this level of Cyber Effect:

  • Cyber Security Pentest Service
  • Cyber Security Code Review Service
  • Cyber Security Incident Management Service
  • PCI-DSS & PA-DSS Services
  • Security Certificate Service - PKI
Do you know what your cybersecurity maturity level is? Learn how to improve.
Request a Quote
We will get back to you as soon as possible.
* Required Field
How can we help?
Contact Us