Calculate the total price of your service
Choose your plan
Cybersecurity services
Number of users
€
Number of servers
Do you need to protect servers?
€
Number of email mailboxes i Indicate both user mailboxes and shared mailboxes
Do you need to protect additional email mailboxes?
€
Number of cloud-based application servers i For example, virtual machines in the cloud such as EC2 or RDS on AWS
Do you have cloud environments (AWS, Azure, GCP...)?
€
IT services
Number of firewalls
Do you have firewalls?
€
Total price:
0.00
€/mes
Send us the quote you have calculated and we will contact you.
CYBERSECURITY SERVICES
Basic
Medium
Plus
Premium
Cybersecurity consulting
Expert guidance to assess and improve your company’s security posture.
Initial cybersecurity assessment
In-depth analysis of your current security status to identify vulnerabilities and risks.
Security Roadmap Development
Detailed analysis of the current security status to identify vulnerabilities and risks, and define a strategic plan for improvement.
Security solutions tnterconnection (Aggregated Security)
Integration of various security tools for unified and efficient protection.
24/7 Security Monitoring
Continuous monitoring of security systems to detect and respond to threats in real time.
Management and administration of Endpoint Security (antivirus)
Configuration, maintenance, and monitoring of antivirus solutions to protect end devices.
XDR management and administration (Threat Traceability)
Advanced monitoring that correlates security events to detect and mitigate threats.
Anti-Phishing solution management and administration
Protection against phishing attacks through monitoring and filtering of malicious emails.
Elaboración del documento de seguridad
Resumen detallado de las soluciones de seguridad implementadas en la empresa.
Data encryption management and administration
Protection of sensitive information through encryption to prevent unauthorized access.
Phishing simulation management and administration
Simulated tests to assess employee readiness against phishing attacks.
MDM management and administration (Mobile Device Management)
Control and protection of corporate mobile devices such as tablets, smartphones, and laptops to prevent data leaks and threats.
KEY FEATURES
Basic
Medium
Plus
Premium
Advanced AI detection engines
Utilization of artificial intelligence to identify and stop threats in real time.
Endpoint Licenses with XDR and MDR included (Advanced Antivirus with Traceability)
Endpoint protection with advanced monitoring and managed threat response.
24/7 Threat containment and response
Immediate action upon threat detection to minimize impact on the company.
Threat Containment: Attack interruption and prevention
Detection and blocking of threats before they spread across the network.
Comprehensive incident response: Complete threat removal
Investigation and eradication of attacks with corrective measures.
Advanced Protection Against Modern Ransomware
Security mechanisms designed to prevent and mitigate ransomware attacks.
Weekly and monthly reports
Detailed reports with metrics and relevant security events.
Búsqueda de amenazas constante (Threat Hunting Activo)
Análisis proactivo de la red en busca de amenazas ocultas o ataques en curso.
Root Cause Analysis of the Threat
In-depth investigation to understand the origin and progression of an attack.
Integration of 24/7 protection with third-party systems
Compatibility with security solutions already implemented in the company.
Security Data Lake
Centralized storage of security logs for analysis and auditing.
Security Telemetry Data Retention (up to 90 days)
Preservation of detailed logs for forensic analysis and regulatory compliance.
Average response times in Detection/Response/Resolution: 2' / 20' / 60'
Commitment to rapid response to minimize the impact of security incidents.
Breach Protection Warranty (Coverage up to 1M USD)*
Financial guarantee to cover incident response costs in the event of a security breach.
*Subject to specific terms and conditions of the external warranty service provider.
ADDITIONAL PROTECTION
Basic
Medium
Plus
Premium
Phishing Protection (Anti-Phishing System)
Advanced defense against fraudulent emails and malicious websites.
Data encryption
Protection of sensitive information through encryption to prevent unauthorized access.
Simulaciones de Phishing
Ejercicios prácticos para evaluar y entrenar a los empleados en la identificación de ataques de phishing.
Mobile device fleet management
Centralized administration and protection of corporate mobile devices such as smartphones, tablets, and laptops.
Cloud infrastructure protection
Advanced security for cloud environments, safeguarding data, access, and configurations.
OPTIONAL IT SERVICES MODULE
Basic
Medium
Plus
Premium
User Technical Support (ServiceDesk)
Assistance and resolution of technological issues for employees.
Incident Management Platform
Centralized system to log, track, and resolve IT issues.
Cloud Platform Management (M365 or Google Workspace)
Administration and optimization of cloud-based collaborative tools.
24/7 Advanced monitoring and preventive device support
Continuous oversight to detect and resolve issues before they impact operations.4o
Daily Backup Management and Monitoring (Double Verification)
Verification and control of backups to ensure their integrity.
Employee onboarding and offboarding protocols
Management of access, devices, and permissions when employees join or leave the company.
Employee technology onboarding
Provisioning, configuration, and delivery of devices for new team members.
Technology consulting and strategy
Advisory services for planning and evolving your IT infrastructure.
IT equipment inventory and lifecycle management
Monitoring and management of hardware status and renewal across the organization.
License and software management
Oversight of licensing and compliance to prevent overspending or legal risks.
IT equipment procurement and management
Advisory and acquisition of hardware aligned with business needs.
Corporate network and WiFi management
Administration and optimization of the company’s connectivity.
Configuration and management of VPNs
Implementation and management of secure private networks for remote access.
IT user satisfaction surveys and monitoring
Ongoing evaluation of user experience to enhance IT service quality.
Critical update deployment and monitoring
Controlled application of security patches and key software updates.
Testing and validation before mass changes
Impact assessment prior to implementing system-wide modifications.
Account and access management (SSO, MFA, etc.)
Centralized management of credentials and secure authentication.
Permission and access policy review and optimization
Adjustment of roles and privileges based on business needs.
License, Software, and Hardware Expense Audit
Analysis of usage and cost optimization in IT.
Support for adoption of new technologies
Guidance through implementation and training on digital tools.
PC and server performance analysis
Evaluation of device performance to identify improvement opportunities.
Hardware/Software optimization recommendations
Suggestions to enhance efficiency and extend the lifespan of your equipment.
Warranty management with manufacturers
Tracking coverage and handling claims with hardware vendors.
Server administration and management
Monitoring, maintenance, and optimization of business servers.
Identification of friction points and improvement in technological processes
Analysis and optimization of IT workflows to enhance efficiency.
Firewall administration and management
Configuration and monitoring of firewalls to protect the corporate network.
Cost optimization recommendations for Cloud or On-Premise Infrastructure
Strategies to reduce expenses and improve IT efficiency.
IT assistancebots or automated responses in ServiceDesk
Automation of responses to enhance technical support efficiency.
Maximum response time
Commitment to address and resolve incidents within a defined timeframe.
12h
8h
6h
4h