About Forensics Investigation

 

We analyze servers attacked and compromised. Extracting the vectors of attack, making a detailed investigation about the information subtraction carried out and the recovery of evidences.

Investigation of evidence

Investigation of evidence of security breaches

Identification of commitment indicators

Identification of commitment indicators, incidents timeline, network connection and user account information, malware and information about vulnerabilities.

relevant information

We get relevant information to prevent possible future threats.

Descubre más posibilidades

Compromised Servers

Compromised Servers

Through a remote forensic agent, we are able to carry out an in-depth analysis of your servers.

Features:    

  • Identification of commitment points and possible information. 
  • Detection of fundamental patterns related to suspicious activities.
Compromised Devices

Compromised Devices

Through our mobile application for remote forensic analysis we are able to do the investigation of Android devices that have been attacked or trojanized.
 

Features:

  • Research on possible data stolen.
  • Provides information on how an attacker could take advantage of security breaches.

See more

PCI-DSS Compliance
PCI-DSS Compliance

We certify in Spain, U.S.A, Peru, Mexico, Colombia, Chile, Argentina, Panama, Costa Rica and Uruguay.

Pentest
Pentest

Based on the performance of intrusion tests on system architectures in companies.

Phishing Hunters
Phishing Hunters

Phishing Hunters is our service composed of modules that try to cover a specific problem related to fraudulent attempts to obtain confidential information in several ways.

Our business services help companies to work intelligently, efficiently and productively