ESED. Cyber Security & IT Solutions

Digital Kit

Take advantage of the SME support programs with our cybersecurity solutions

 

Digital kit

Take advantage of the Spanish Government's support program, included within the "Next Generation EU" funds, to implement digital solutions in your business. If you meet the conditions set out in the Digital Kit Program call for proposals, you will be eligible for a Digital Voucher, allowing you to access digitalization solutions. 

 

Who can apply for it?

The digital solutions provided by the Digital Kit are tailored to the needs of small businesses, medium-sized enterprises, microenterprises, and self-employed workers in any sector or type of business.


SED offers the following services associated with the Digital Kit

Web design and development

Solution category: Website and online presence

 

Expansion of the SME's online presence through the creation of a website and/or the presentation of services that provide basic online positioning.

Grant: €2.000.
Segment III: 0 < 3 employees. 
Segment II: 3 < 10 employees.
Segment I: 10 < 50 employees.

Functionalities and services:

  • Domain: Registration of a new domain for the beneficiary SME for a minimum period of twelve months. The domain ownership will be entirely with the SME.

  • Hosting: Hosting of the developed website for a minimum period of twelve months.

  • Website design: Website structure with a minimum of 3 pages or sections. Pages or sections considered part of a website include elements such as: homepage (Landing page), company presentation, contact form, product descriptions, contact information, site map, etc.

  • Responsive web design: The designed web pages must adapt to be functional on all types of devices.

  • Accessibility: The design must comply with level AA conformance criteria of the WCAG-2.1 guidelines.

  • Self-manageable: A content management platform must be provided for the beneficiary, enabling them to independently modify the content of their web pages without needing to rely on the support of the service provider.

  • Basic online positioning: Positioning of the basic information about the business, contact details, and company profile on major sites, business networks, or directories of businesses and professionals.

  • Search engine optimization (basic SEO): Keyword analysis, On-Page SEO for 2 pages or sections, indexing, and content hierarchy.

Icon - Monitorización

Implementation of Google Workspace and Office 365

Solution category: Virtual office services and tools.

Implement interactive and functional solutions that enable more efficient collaboration among the employees of the beneficiary companies

Grant: €250/user.
0 < 3 employees: Up to 2 users.
3 < 10 employees: Up to 9 users.
10 < 50 employees: Up to 48 users.
50 < 100 employees: Up to 99 users.
100 < 250 employees: Up to 116 users.


Functionalities and services:

  • Collaboration in work teams: The solution will enable agile and efficient management of teams for collaborative project development, sharing resources and/or knowledge, providing tools for team interaction in ideation or problem-solving processes, as well as configuring and customizing workflows, etc.

  • Storing and sharing files: This is a tool that allows us to create, access, and share documents in Word, Excel, OneNote, and PowerPoint. The solution must provide 1 TB of storage.

  • Mobile device compatibility: A suite that allows us to work with office automation tools and collaboration tools from any device and anywhere.

  • Calendar and agenda: The solution must allow for organizing a calendar and the planned tasks.

 

Icon - Administración

Security in connections between devices

Solution category: Secure communications

 

Provide the beneficiary companies with security in the connections between their employees' devices and the company. 

Grant: €125/user.
0 < 3 employees: Up to 2 users.
3 < 10 employees: Up to 9 users.
10 < 50 employees: Up to 48 users.
50 < 100 employees: Up to 99 users.
100 < 250 employees: Up to 232 users.

The contracted solution includes:

  • SSL: The solution must use a secure sockets layer protocol to create a secure and encrypted connection.

  • End-to-end encryption: The solution must keep communications encrypted throughout their journey to prevent attacks.

  • Connection logs: The solution must maintain a record of the devices that have connected to the SME's private network.

  • Access control: The solution must allow connection to the SME's private network exclusively for devices authorized by the company.

  • Mobile devices: The solution must be available for use from mobile devices.

  • Initial configuration and security updates: An initial configuration must be performed for proper use, along with the respective updates for malware signatures and other threat detection data, in addition to the required periodic security software updates.

Icon-Respuesta-a-incidencias

Cybersecurity for businesses and freelancers

Solution category: Cybersecurity

We offer basic and advanced security for your employees' devices

Grant: €125/device.
0 < 3 users: Up to 2 devices.
3 < 10 users: Up to 9 devices.
10 < 50 users: Up to 48 devices.
50 < 100 users: Up to 99 devices.
100 < 250 users: Up to 232 devices.

The contracted solution includes:

  • Antimalware: The solution must provide a tool that scans the device, its internal memory, and external storage devices.

  • Antispyware: The solution must provide a tool that detects and prevents spyware.

  • Secure email: The solution must provide email analysis tools with the following features:

    • Antispam, with detection and filtering of unwanted emails.

    • Antiphishing, with detection of emails containing links or malware suspected of being used to steal credentials.


    Safe browsing:

  • Content control.

  • Adware protection to prevent malicious advertisements.

Threat analysis and detection: The solution must allow for understanding the behavior of known and new threats.

Network monitoring: The solution must provide tools that analyze network traffic and alert to threats.

Initial configuration and security updates: An initial configuration must be performed for proper use, along with the respective updates for malware signatures and other threat detection data, in addition to the required periodic security software updates.

Special training requirements: In addition to common training requirements, the training provided to the beneficiary must include tutoring for the configuration of the security software, as well as a cybersecurity awareness kit to complement the solution with human firewall skills.

big-icon-endpoint

SEO positioning on the Internet

Solution Category: Advanced online presence

 

Provision of functionalities and/or services that ensure the Beneficiary's positioning on the Internet, increasing their reach to potential customers and boosting traffic to their platform(s).

Grant: €2.000€ for: 
Segment III: 0 < 3 employees.  
SegmentoII:  3 < employees. 
Segment I: 10 < employees. 

Grant: €5.000 for: 
Segment IV: 50 < 100 employees. 
Segment V: 100 < 250 employees. 

The contracted solution includes:

  • Basic online positioning: Positioning of the basic information about the business, contact details, and company profile on major sites, business networks, or directories of businesses and professionals.

  • Keyword analysis: Management, search, and analysis of keywords to develop useful strategies for search engines to classify content and help users find relevant results for their queries.

  • Competitor analysis: A monthly competitor analysis must be conducted to inform beneficiary companies of their position relative to competitors.

  • On-Page SEO: The solution must offer a minimum service of two (2) SEO On-Page pages or sections, optimizing the structure and internal content to improve the natural ranking of the SME in search engines, as well as the indexing and hierarchy of the content.

  • Off-Page SEO: The solution must provide this service, which involves executing actions outside the website environment to improve its organic positioning.

  • Monthly follow-up reports: The results of the executed actions must be reported to raise awareness of the evolution and impact of these actions on the online presence of the beneficiary company.

Only in Segments IV and V is included:

  • Creation of structured page metadata. The solution must provide the creation of structured page metadata. 

 

Icon - Disminución de los riesgos

Managed cybersecurity

Solution category: Managed cybersecurity service

Provide beneficiary companies with a service that combines EDR (Endpoint Detection and Response) and MDR (Managed Detection and Response) techniques to detect cybersecurity incidents in real time and address them as quickly and effectively as possible.

50 < 100 eemployees: Up to 99 devices.
100 < 250 employees: Up to 145 devices.

The contracted solution includes:

  • Initial installation and configuration: Installation and initial configuration of security tools for detecting, interrupting, and responding to threats on endpoints (servers, PCs, laptops, mobile phones, etc.) and/or at a global level (e.g., probes), integrated with a SIEM solution that collects information from various sources within the company for correlation and analysis.

  • Detection and response on endpoints: The implemented solution must include detection and response mechanisms on endpoints, with EDR protection provided alongside other components of the implemented solution or integrated with existing EDR solutions on the endpoints.

  • Sources to monitor: The implemented solution must protect against threats affecting various sources within the company, such as endpoints (servers, PCs, laptops, mobile phones, etc.) or Cloud solutions.

  • Threat alerts: The service will alert contacts at the beneficiary company about potential threats detected, at a minimum via email, immediately after the detection of the threat.

  • Availability of a team of experts: The installed solution will be accompanied by a team of experts to address any questions that may arise related to the service, as well as for continuous analysis and monitoring of generated alerts.

  • 24x7x365 monitoring: The service will be operational 24 hours a day, 7 days a week, 365 days a year.

  • Search, containment, and response to threats: The service will actively search for potential threats and will prevent, interrupt, and respond to possible attacks, also ensuring that they do not spread to other parts of the beneficiary company's network.

  • Monthly follow-up reports: Monthly reports must be generated regarding identified incidents and their root causes, as well as the company's security status.

  • Direct assistance: In the event of a security incident, the beneficiary company will have access to a direct phone line to the service team for clarification on any issues arising from an attack.

Icon - Sistemas seguros

Computer with integrated cybersecurity

Solution category: Secure workstation

 

Provide microenterprises, small businesses, and freelancers with security, mobility, and collaboration tools at their workstation to enhance their productivity.

Grant: €1.000/device. 
0 < 3 employees: Maximum of 1 device.

This solution, provided as a service, includes a hardware device that must be integrated into the product (and included in the price), along with a license that meets the requirements established for category X: Cybersecurity, as well as encryption at rest to ensure the privacy of the data and documents stored on the device.

The subsidizable devices in this category of digitalization solution may include: new laptops or desktop computers, with refurbished devices not considered, and must have at least the following characteristics:

Minimum hardware device requirements

  • Processor: The device's processor must have a minimum of 4 physical cores and a maximum clock speed (CPU clock) of at least 2.9 GHz (in turbo mode or equivalent). Its release date must be after the first quarter of 2023.

  • Performance: The device's processor must have achieved a minimum score of 15,000 on PassMark Software, as of May 13, 2024.

  • RAM: The device must have at least 16 GB of DDR4 memory or equivalent superior technology.

  • Storage: The device must provide a minimum of 512 GB of internal SSD NVMe storage. All data and documents contained in the computer must be protected by encryption in rest to ensure their security. The encryption passwords must be provided by the Attached Digitalizer Agent to the beneficiary at the time of device delivery.

  • Operating System: The operating system must be of a professional nature. It will be provided together with each device and will come pre-installed and factory licensed.

  • Graphics Card: The device must have a dedicated or integrated graphics card, with a minimum Full HD resolution. In the case of a laptop, it must support the use of two monitors.

  • Integrated Sound Card: The device must have an integrated sound card.

  • Wireless Connectivity: The device must have an integrated wireless network card compatible with the Wi-Fi 6 standard or higher. It must also provide Bluetooth 5.1 or higher connectivity.

  • Input/Output Interfaces: At least 2 USB 3.0 or higher Type A ports.
    At least 1 USB 3.0 or higher Type C port. For portable devices, at least one of them must have DisplayPort + Power Delivery + USB functions.
    One RJ-45 Ethernet port (1 Gbps).
    One HDMI port (1.4 or higher).
    Audio I/O: At least one 3.5 mm combo jack interface for headphones and microphone.

  • In the case of laptops, providing the interfaces through docking station devices, port replicators, or similar is permitted.

  • Screen: If the device is a laptop, it must have a minimum screen size of 13 inches.

  • Keyboard: In the case of desktop computers, a Spanish keyboard must be provided to ensure the full functionality of the device.

  • Mouse: An optical mouse equipped with at least two buttons and scroll function to ensure the full functionality of the device. In the case of laptops, an integrated mouse or touchpad is acceptable.

  • Webcam: At least HD resolution. Integrated webcam with privacy shutter in the case of laptops.

  • Battery: In the case of laptops, a smart battery or similar type.

  • Smartcard Reader (DNI-e): A smart card reader that complies with the ISO-7816 standard. Integrated or non-integrated devices are acceptable.

  • Certifications: Desktop and laptop computers must have at least one certification from the following types (or similar):
    ENERGY STAR®.
    EPEAT™ Silver Registered.
    TCO.

  • Robustness: MIL STD 810H certification or equivalent. They must meet a minimum of 5 methods, including: high temperature, low temperature, and humidity.

  • The equipment must comply with energy-related requirements established according to Directive 2009/125/EC for servers and data storage, or computers and computer servers, or electronic displays. The used equipment must not contain the restricted substances listed in Annex II of Directive 2011/65/EU, unless the weight concentration values in homogeneous materials do not exceed those listed in that annex. In these acquisitions, measures will be activated to ensure the purchase of energy-efficient equipment that is fully compliant with the “Code of Conduct for ICT” of the European Commission, and steps will be taken to enhance the durability, repairability, upgradability, and reusability of the products and the installed electrical and electronic devices. At the end of the useful life of the acquired digital technology, it must be treated in accordance with current legislation (including that the equipment will be subjected to preparation for reuse, recovery, or recycling operations, or adequate treatment, including the removal of all fluids and selective treatment according to Annex VII of Directive 2012/19/EU) and must not negatively impact environmental objectives.

  • To facilitate support tasks, remote management of computer equipment through MDM solutions, device platforming, automatic recovery, or similar will be allowed, enabling remote management, restoration, and optimal operation of the equipment. In such cases, compliance with current data protection legislation and the guarantee of digital rights must be ensured, as well as the regulations applicable to these systems. The information collected in such cases will be the minimum necessary to provide support services.


In the particular case of desktop computers

Monitor: In the case of desktop computers, if there is no integrated monitor, a monitor must be provided that meets at least the following requirements:

  • Size: The monitor must have a screen size of at least 23 inches.

  • Resolution: The monitor must have a minimum resolution of Full HD.

  • Display Technology: The monitor must utilize LCD, LED, or equivalent display technology.

  • Interfaces: At least 1 HDMI port.

  • Energy Label: The monitor must have the European Union energy label.


Minimum Security Requirements

  • Secure Boot: The device will have protection measures for the boot process against security attacks through malicious code, such as Secure Boot or similar.

  • TPM Chip, T2, or Similar, Depending on Platform: The device will include a TPM or T2 chip to strengthen system integrity, mitigate risks of cyber attacks, and provide a more solid foundation for security.

  • Biometric Identification: The device will implement (via hardware or operating system) biometric security elements, such as a facial recognition camera or fingerprint reader, to enhance access security to the system.


    Advertising Requirements

    The device must have either an engraving or a label affixed to the laptop or the desktop and monitor (not on mice or keyboards). In the case of replacement, the new equipment must be labeled or engraved under the same conditions as the equipment it replaces. The composition must include the following logos:

  • The emblem of the European Union (available at the link https://planderecuperacion.gob.es/identidad-visual), indicating "Funded by the European Union - Next Generation EU."

  • The logo of the Recovery, Transformation, and Resilience Plan.

  • The logo of the Ministry for Digital Transformation and Public Function.

  • The logo of the Public Business Entity Red.es (It should appear as “Red.es”).


    Adhesive Label Option

The advisor will attach a visible adhesive label to each laptop or desktop computer and monitor on a surface with the following minimum technical characteristics

Material:

  • Wear resistant.

  • Water resistant.

  • Solvent resistant.

  • Light resistant.

  • High temperature resistant.

  • Abrasion resistant.

  • High resistance to breakage.


Adhesive:

  • Anti-vandalism adhesive.

  • Permanent adhesive.

  • Universal adhesive adaptable to different surfaces.

  • Resistant to the passage of time.

  • Resistant to temperatures from –40 °C to +145 °C. 

Impression:

  • Logos supported.

  • Long-lasting indelible ink.

     

Engraving option

As an alternative to placing labels, each laptop or computer + monitor may be identified by engraving on clearly visible surfaces, using indelible methods that cannot be separated from them. The supported procedures are pantography, die-cutting, thermal engraving or laser engraving. Any other method will require prior approval by Red.es

The Digitizing Agent must provide a Maintenance and Support service from the delivery of the devices that make up the solution, until the completion of phase 2 execution:


Minimum requirements for the maintenance and support service

  • The delivery of the device must be carried out within Spain, the digitizer must ensure the proper functioning of the computing devices delivered.

  • The device will be delivered already configured (hardware and software), including all necessary updates.

  • There will be a support service for the beneficiary to resolve incidents, breakdowns or configuration problems.

  • The support service will assist the beneficiary 8 hours a day for 5 working days a week (8x5) at least. You must have an email to receive notifications of breakdowns or incidents, with a minimum service schedule for these communications from 9:00 a.m. to 5:00 p.m., Monday to Friday.

  • All necessary repairs must be carried out either through remote support or, if necessary, on site at the location where the computing device was delivered. If it is not possible to make the repair on site, the costs of packaging and transporting the damaged equipment will be the responsibility of the digitizer. These repairs include both breakage or damage at the device level and configuration problems, as long as it is based on correct use of the device.

  • The maximum time for repairing the fault, between the communication of the incident and until its resolution, will be 5 working days, being able to opt for mechanisms such as extension of the manufacturer's warranty on site or equivalent mechanisms. If the repair is not achieved within that period, equal or superior replacement equipment must be delivered until the repair is complete. The costs of delivering this replacement equipment, including packaging and transportation, will be borne by the digitizer.

Minimum requirements of the cybersecurity solution

The device must incorporate a cybersecurity solution with the minimum requirements associated with solution categories X. Cybersecurity:

  • Antimalware: The solution should provide a tool that scans the device, its internal memory, and external storage devices.

  • Antispyware: The solution will need to provide a tool that detects and prevents spy malware.

  • Secure Email: The solution must provide email analysis tools with the following features:

    • Anti-spam, with spam detection and filter.

    • Antiphishing, with detection of emails with links or malware that are suspected of being used to steal credentials.

  • Safe browsing: content control and anti-adware to avoid malicious ads.

  • Analysis and detection of threats: the solution must allow knowing the behavior of known and new threats.

  • Network monitoring: The solution should provide tools that analyze network traffic and warn of threats.

  • Initial configuration and security updates: an initial configuration must be performed for correct use, with the respective updates of malware signatures and other data for threat detection in addition to the required periodic security software updates.

  • Special training requirements: In addition to the common training requirements, the training provided to the beneficiary must include a tutorial for the configuration of the security software, as well as include a cybersecurity awareness kit to complement the solution with human firewall skills.

    Possibility of acquiring associated hardware.

Once phase II of the service is completed, the beneficiary may acquire ownership of the hardware, upon payment to the Adhered Digitizing Agent of the residual value of the equipment.

The Adhering Digitizing Agent is obliged to offer the option to purchase a Secure Work Position to the beneficiary. In the event that the beneficiary does not pay the agreed residual amount, the Affiliated Digitizing Agent may recover the equipment.

The Adhering Digitizing Agent must inform the beneficiary of the purchase value of the equipment at the end of the 12 months of service provision corresponding to Phase II. This amount that the beneficiary must pay will be the acquisition value of the equipment and must be reflected in the Digitalization Solutions Provision Agreement. At most, the amount of the purchase value will be 15% of the amount of the signed agreement (solution amount).

big-icon-estrategia-ciberseguridad

¿Necesitas más información sobre Kit Digital?

Si tienes dudas sobre nuestras soluciones y como encajan con el programa de Kit Digital ponte en contacto con nosotros. Te ayudaremos y asesoraremos encantados.