Infrastructure security assessment
Network and perimeter penetration testing for public Internet: intercepted communications, wireless network attacks, Active Directory Domain Configuration breaches, technological and physical vulnerabilities.


Vulnerabilities identification
Identify vulnerabilities in your systems, networks and cloud environments, and make the necessary corrections.
Penetration testing and simulated Attack
Simulate an attack through computer, penetration tests with realistic attacker scenarios, such as an Internet hacker.
