This level delivers to the customer, a real-time monitoring, management, and control of their organization's security, with clear visibility of internal and external risks against computer attacks, carried out under different vectors. Here, the organization is prepared to ensure compliance with international security standards, with an efficient and effective control of threats, through the adoption of response mechanisms to security incidents up to tier 2.
Execution of security audit services based on controls of the main security standards, according to the organization's business (IT, IoT, OT, …), as well as analysis of vulnerabilities and injection of security incidents, with injection of zero-day/zero-hour exploits, to applications, ports, services, protocols, databases into infrastructure & cloud, web, mobile, Wi-Fi under methodologies black-box, gray-box and white-box. In addition, this level is complemented with response capabilities against security incidents, ensuring the correlation, detection and correction/mitigation of attacks against botnets, DDoS, fuzzing, trojans, ransomware, phishing and its aspects, social engineering attacks, mobile malware and widespread malware.