CYBER SECURITY INSIDE THE ORGANIZATIONS

Telecommunication and Information Technologies (TICs) are very important these days, and are present in practically every social, professional and economic activity. The constant evolution and new threats; have led us constantly change the way we look at technologies. Implementation of new platforms has become more complex, and demanding; on the one hand, experts with a comprehensive understanding of networks and, on the other hand, people who have a complete vision of organizational security to ensure the availability and security of information at all times and places.

To face this reality, CIBERWARFARE was born, a division of ITSA specialized in the provision of professional cybersecurity solutions and services, formed by a highly qualified professional team with recognized experience in the national and international market, both in the public and private sectors.

The complexity and the level of specialization demanded by cybersecurity demands make it very difficult to form and maintain teams in organizations. CIBERWARFARE assists our clients as a true strategic partner, taking care of your security so that you only have to take care of your business.

Our parent company complements our offering by providing network solutions, physical security devices, user devices and a wide variety of professional equipment for voice, audio, video and data transmission.

SPECIALIZED PROFESSIONAL SERVICES

ISO 27000

We provide consulting services to organizations for certification and maintenance of Information Security Management Systems.

CYBERSECURITY ADVISORY SERVICES

Security incident management, regulatory framework, strategic security planning, forensic investigation, development of business continuity and disaster recovery plans, cyber security and risk assessments, architecture design, and vulnerability management.

MITRE ATT&CK FRAMEWORK

We implement attack vector tactics using Cymulate's BAS (Breach and Attack Simulation) tool that challenges security controls by performing thousands of attack simulations, quickly exposing security breaches and providing corresponding mitigations; making security continuous, fast, and part of daily business.

CYBER SOLUTIONS

DIGITAL IDENTITY

PKI: Public key infrastructure

MONITORING INCIDENTS

SIEM: Security Information and Event Management

GRC: Governance, Risk Management, and Compliance

SOAR: Security Orchestration, Automation, and Response

 

ENDPOINT PROTECTION

BAS: Breach and Attack Simulation

DLP: Data Loss Prevention

EPP: Endpoint Protection Platform

EDR: Endpoint Detection and Response

PERIMETER PROTECTION

BAS: Breach and Attack Simulation

SWG: Secure Web Gateway

UTM: Unified Threat Management

NGFW: Next Generation Firewall

WAF: Web Application Firewall

CLOUD PROTECTION

CWPP: Cloud Workload Protection Platform

CSPM: Cloud Security Posture Management

CASB: Cloud Access Security Broker

ZTNA: Zero Trust Network Access

TECHNOLOGICAL PARTNERS

CONTACT US

Lavalle 392 piso 3, C1047AAH, C.A.B.A., Argentina

Mail: info@itsa.com.ar - Tel: +54 911 3122-0055

Visit us on our social networks: