Kit Digital

Benefit from SME grants with our cybersecurity solutions

 
Logo-digitalizadores

Kit Digital

Take advantage of the Spanish Government's aid program included in the "Next Generation EU" funds for implementing digital solutions in your business. If you meet the conditions established in the Digital Kit Program's call for proposals, you can obtain a Digital Voucher that will give you access to digitalization solutions.

Who can apply?

The digital solutions provided by the Digital Kit are aimed at the needs of small and medium-sized businesses, micro-enterprises, and self-employed individuals from any sector or type of business.


ESED offers the following services associated with the Digital Kit

ecommerce
E-commerce

Creation of a secure e-commerce platform

Development of an online store for buying and selling products and/or services that uses digital means for transactions.

More information

diseño-y-desarrollo
Website and internet presence

Web design and development

Creation of a website to provide basic online visibility.                                                                                                                                                                          

More information

digitalizacion-facturas
Billing and Electronic Invoice Management

Invoice Digitization Services

Digitization and security of business processes related to billing in SMEs.                                           

More information

implementación-google-workspace-y-office
Virtual office services and tools

Implementation of Google Workspace and Office 365

Solutions for more collaborative and efficient work.                                                                                        

More information

seguridad-en-las-conexiones-entre-dispositivos
Secure communications

Security in connections between devices

Provide security in the connections between your employees' devices and the company. 

More information

ciberseguridad-gestionada
Managed cybersecurity service

Managed cybersecurity

Provide a service that combines EDR and MDR techniques to detect incidents in real time.

 

More information 

ciberseguridad-para-empresas-y-autónomos
Cybersecurity

Cybersecurity for Businesses and Self-Employed Individuals

Basic and advanced security for your employees' devices.

                                                                                           

More information

seo
Advanced online presence

SEO Positioning on the Internet

Provision of functionalities and/or services that ensure the Beneficiary's positioning on the Internet.

More information

ciberseguridad-gestionada
Managed cybersecurity service

Managed cybersecurity

Provide a service that combines EDR and MDR techniques to detect incidents in real time.                   

 

More information 

ecommerce

E-commerce Design and Development

Solution category: e-commerce

Creation of an online store for buying and selling products and/or services using digital channels for transactions.

Grant: €2.000. 
Segment III: 0 < 3 employees. 
Segment II: 3 < 10 employees. 
Segment I: 10 < 50 employees. 
 
For segments IV and V
Grant: €5.000. 
Segment IV: 50 < 100 employees. 
Segment V: 100 < 250 employees. 
 
Requirements and specifications
  • Creation of the Online Store or E-Commerce Platform and Product.

  • Catalog Setup: Production of a catalog by adding, importing, or uploading the SME’s products or items. The digital agent will upload at least 100 product references, unless the SME has fewer, in which case it may be lower.

  • Payment Methods: Configuration and integration of payment methods.

  • Responsive Design: The e-commerce solution must be designed to function effectively on all types of devices.

  • Accessibility: The design must comply with AA level conformity criteria of the WCAG-2.1 Guidelines.

  • Basic Online Presence: Positioning of the business's basic information, contact details, and company profile on major sites, business networks, or directories for companies and professionals.

  • Search Engine Optimization (SEO): Keyword analysis, competitor analysis, On-Page SEO for two pages or sections, content indexing and hierarchy, and quarterly tracking reports.

  • Self-Manageable: A content management platform must be provided to the beneficiary so they can independently modify their web page content without relying on support from the provider.

  • Shipping Methods: Configuration and integration of digital and physical shipping methods for products sold by the beneficiary in the online store.
diseño-y-desarrollo

Web Design and Development

Solution category: Website and Internet presence

Expansion of the SME's internet presence through the creation of a website and/or the presentation of services that provide basic online positioning.

Grant: €2.000. 
Segment III: 0 < 3 employees. 
Segment II: 3 < 10 employees. 
Segment I: 10 < 50 employees. 
 
Requirements and specifications
  • Domain: Registration of a new domain for the beneficiary SME for a minimum period of twelve months. The SME will fully own the domain.

  • Hosting: Hosting of the developed website for a minimum period of twelve months.

  • Website Design: Web structure with a minimum of 3 pages or sections, which may include elements such as: landing page, company introduction, contact form, product descriptions, contact information, sitemap, etc.

  • Responsive Web Design: The website must be adaptable and functional on all types of devices.

  • Accessibility: The design must meet level AA conformity criteria of the WCAG-2.1 guidelines.

  • Self-Manageable: A content management platform must be provided for the beneficiary, allowing them to independently modify website content without needing support from the provider.

  • Basic Online Positioning: Positioning of the business's basic information, contact details, and profile on main sites, business networks, or professional directories.

  • Basic Search Engine Optimization (SEO): Keyword analysis, On-Page SEO for 2 pages or sections, content indexing, and hierarchy.
digitalizacion-facturas

Invoice Digitization Services

Solution category: Billing and Electronic Invoice Management

Digitize the flow of issued invoices between beneficiary companies and their customers, as well as received invoices from suppliers. Ensure the digitization and security of business processes related to billing in SMEs through electronic or computer systems.

For segment III

Grant: €1.000 (1 user)
Segment III: 0 < 3 employees. 
 
For segment II and I

Grant: €2.000 (3 users)
Segment II: 3 < 10 employees. 

Segment I: 10 < 50 employees. 
 
Requirements and specifications
  • Segments I (10–less than 50 employees) and II (3–less than 10 employees): 10 hours of customization.

  • Segment III (0–less than 3 employees): 5 hours of customization. This process is essential for the subsequent implementation and deployment of the digitalization solution, which will provide at a minimum the following functionalities and/or services:
    • Invoices in Structured Format: The solution must allow for the issuance of invoices in structured formats, at least in FACTURA-E format, to facilitate automated processing.
    • Unlimited Invoices: The solution must support the issuance and reception of an unlimited number of invoices.

  • Unlimited Clients: The solution must allow invoicing for an unlimited number of clients.

  • Unlimited Products or Services: The solution must enable the creation of an unlimited number of billable products and/or services within the catalog.

  • Invoice Sending and Receiving: The solution must support direct electronic invoice sending and receiving, at minimum via email.

  • Invoice Customization: Invoices generated by the solution must be customizable, including logo selection.

  • Periodic Backups: The solution will include periodic backups, with at least daily frequency.

  • 1 GB Invoice Storage/History: The solution will provide at least 1 GB of storage for invoices.

  • Integration with Other Solutions: The solution must include APIs or Web Services for integration with other tools, as well as support manual data entry.

  • Invoice Due Date Tracking: The solution must include a system for tracking invoice due dates.

  • Billing Record Generation: The solution must simultaneously or immediately prior to issuance generate a standardized billing record, with the option for submission to the Tax Authority and guarantee of data integrity, preservation, accessibility, readability, traceability, and immutability.

  • Invoice Issuance: The billing software must issue invoices in both paper and electronic formats, including the necessary elements for incorporation or verification by the buyer with the Tax Authority.

  • Verification or Submission: The solution must allow for the verification or submission of billing records at the request of authorities whenever voluntary submission is not provided (VERI*FACTU System).

  • Responsible Declaration: The solution must include a responsible declaration from the manufacturer or developer certifying that the software complies with current tax regulations.
implementación-google-workspace-y-office

Implementation Google WorkSpace y Office 365

Solution category: Virtual office services and tools 

Implementation of interactive and functional solutions that enable more efficient collaboration among employees of beneficiary companies.

Grant: €250/usuario. 
0 < 3 employees: Up to 2 users. 
3 < 10 employees: Up to 9 users. 
10 < 50 employees: Up  to 48 users. 
50 < 100 employees Up to 99 users. 
100 < 250 employees: Up to 116 users. 
 
Requirements and specifications
  • Collaboration in Work Teams: The solution will enable agile and efficient management of teams for collaborative project development, sharing resources and/or knowledge, providing tools for team interaction in ideation or problem-solving processes, as well as configuring and personalizing workflows, etc.

  • Storing and Sharing Files: This tool allows us to create, access, and share Word, Excel, OneNote, and PowerPoint documents. The solution must provide 1 TB of storage.

  • Mobile Device Compatibility: A suite that allows us to work with office tools and collaboration tools from any device and anywhere.

  • Calendar and Agenda: The solution must allow organizing a calendar and planned tasks.
seguridad-en-las-conexiones-entre-dispositivos

Security in connections between devices

Solution category: Secure communications

Provide beneficiary companies with security for the connections between their employees' devices and the company.

Grant: 125/user. 
0 < 3 empeloyees: Up to 2 users. 
3 < 10 employees: Up to 9 users. 
10 < 50 employees: Up  to 48 users.
50 < 100 employees: Up to 99 users.
100 < 250 employees: Up to 232 users.

Requirements and specifications
  • SSL: The solution must use a Secure Sockets Layer protocol to create a secure and encrypted connection.

  • End-to-End Encryption: The solution must maintain encrypted communications throughout their journey to prevent attacks.

  • Connection Logs: The solution must keep a record of the devices that have connected to the SME's private network.

  • Access Control: The solution must allow connection to the SME's private network exclusively for devices authorized by the company.

  • Mobile Devices: The solution must be available for use from mobile devices.

  • Initial Configuration and Security Updates: An initial configuration must be performed for proper use, along with the respective updates for malware signatures and other threat detection data, in addition to the periodic required security software updates.
ciberseguridad-para-empresas-y-autónomos

Cybersecurity for businesses and self-employed individuals

Solution category: Cibersecurity

We offer basic and advanced security for your employees' devices.

Grant: 125/device. 
0 < 3 usersUp to 2 devices. 
3 < 10 users: Up to 9 devices. 
10 < 50 users: Up to 48 devices.
50 < 100 users: Up to 99 devices.
100 < 250 usuarios: Up to 232 devices.

Requirements and specifications
  • Antimalware: The solution must provide a tool that scans the device, its internal memory, and external storage devices.

  • Antispyware: The solution must provide a tool that detects and prevents spyware malware.

  • Secure Email: The solution must provide email analysis tools with the following features:
    • Antispam: Detects and filters out unwanted emails.
    • Antiphishing: Detects emails with links or malware suspected of being used to steal credentials.

  • Safe Browsing: Content control.

  • Anti-adware: Prevents malicious ads.

  • Threat Analysis and Detection: The solution must allow for the understanding of the behavior of known and new threats.

  • Network Monitoring: The solution must provide tools that analyze network traffic and alert for threats.

  • Initial Configuration and Security Updates: An initial configuration must be performed for proper use, along with the respective updates for malware signatures and other threat detection data, as well as the required periodic security software updates.

  • Special Training Requirements: In addition to common training requirements, the training provided to the beneficiary must include guidance for configuring the security software, as well as a cybersecurity awareness kit to complement the solution with human firewall skills.
seo

SEO position on the Internet

Solution category: Advenced online presence

Provision of functionalities and/or services that ensure the Beneficiary's positioning on the Internet, increasing their reach to potential customers and boosting traffic to their platform(s).

Grant: 2.000€ per: 
Segment III0 < 3 employees. 
Segment II: 3 < 10 employees. 
Segment I: 10 < 50 employees.

Grant: 5.000 per: 
Segment IV: 50 < 100 employees. 
Segment V: 100 < 250 employees. 

Requirements and specifications
  • Basic Online Positioning: Positioning of the basic information about the business, contact details, and company profile on major sites, business networks, or directories of companies and professionals.

  • Keyword Analysis: Management, search, and analysis of keywords to develop useful strategies for search engines to rank content and help users find relevant results for their queries.

  • Competitor Analysis: A monthly analysis of competitors must be conducted to inform beneficiary companies of their standing against competitors.

  • On-Page SEO: The solution must offer a minimum service of two (2) On-Page SEO pages or sections, optimizing the structure and internal content to improve the SME's natural position in search engines, as well as content indexing and hierarchy.

  • Off-Page SEO: The solution must provide this service, which involves executing actions outside the website environment to improve its organic positioning.

  • Monthly Follow-up Reports: The results of the executed actions must be reported to raise awareness of the evolution and impact of these actions on the online presence of the beneficiary company.

    Only in Segments IV and V is included:
  • Creation of Structured Page Metadata: The solution must provide the creation of structured page metadata.
ciberseguridad-gestionada

Managed Cybersecurity

Solution Category: Managed Cybersecurity Service

Provide beneficiary companies with a service that combines EDR (Endpoint Detection and Response) and MDR (Managed Detection and Response) techniques to detect cybersecurity incidents in real time and address them as quickly and effectively as possible.

Grant: 200/device. 
50 < 100 employeesUp to 99 users. 
100 < 250 empleados: Up to 145 users. 

Requirements and Specifications
  • Installation and Initial Configuration: Installation and initial configuration of security tools for detection, interruption, and response to threats on endpoints (servers, PCs, laptops, mobile phones, etc.) and/or at a global level (e.g., probes), integrated with a SIEM solution that collects information from various sources within the company for correlation and analysis.

  • Detection and Response on Endpoints: The implemented solution must include mechanisms for detection and response on endpoints, with EDR protection provided alongside the other components of the implemented solution or integrated with existing EDR solutions on the endpoints.

  • Sources to Monitor: The implemented solution must protect against threats affecting various sources within the company, such as endpoints (servers, PCs, laptops, mobile phones, etc.) or Cloud solutions.

  • Threat Alerts: The service will alert the contacts at the beneficiary company of any detected potential threats, at a minimum via email, immediately after the threat is detected.

  • Availability of an Expert Team: The installed solution will be accompanied by a team of experts to address any questions related to the service, as well as for continuous analysis and monitoring of the generated alerts.

  • 24/7/365 Monitoring: The service will be operational 24 hours a day, 7 days a week, 365 days a year.

  • Search, Containment, and Response to Threats: The service will actively search for potential threats, prevent, interrupt, and respond to possible attacks, and also stop them from spreading to other parts of the beneficiary company's network.

  • Monthly Follow-Up Reports: Monthly reports must be generated on identified incidents and their root causes, as well as the company's security status.

  • Direct Assistance: In the event of a security incident, the beneficiary company will have access to a direct phone line to contact the service team to clarify any issues arising from an attack.
ordenador-con-ciberseguridad-integrada

Computer with integrated cybersecurity

Solution category: Secure Workplace

Provide microenterprises, small businesses, and self-employed individuals with security, mobility, and collaboration tools at their workplace to enhance their productivity.

Grant: 1.000€/device. 
0 < 3 employeesMaximum of 1 device. 
 
Requirements and specifications

This solution, provided as a service, includes a hardware device that must be integrated into the product (and included in the price), along with a license that meets the requirements established for category X: Cybersecurity, as well as encryption at rest to ensure the privacy of the data and documents stored on the device.

The subsidizable devices in this category of digitalization solution may be: new laptops or desktop computers, with refurbished devices not being considered, and they must have at least the following characteristics:

Minimum requirements for the hardware device:

  • Processor: The device's processor must have a minimum of 4 physical cores and a maximum clock speed (CPU clock) of at least 2.9 GHz (in turbo mode or equivalent). Its release date must be after the first quarter of 2023.

  • Performance: The device's processor must have achieved a minimum score of 15,000 on PassMark Software as of May 13, 2024.

  • RAM: The device must have a memory of 16 GB DDR4 or equivalent superior technology.

  • Storage: The device must provide a minimum of 512 GB of internal SSD NVMe storage. All data and documents contained on the computer must be protected by encryption at rest to ensure their security. The encryption passwords must be provided by the Adhering Digital Agent to the beneficiary at the time of device delivery.

  • Operating System: The operating system must be professional-grade. It will be provided with each device and will come pre-installed and factory licensed.

  • Graphics Card: The device must have a dedicated or integrated graphics card with a minimum resolution of Full HD. If it is a laptop, it must support the use of two monitors.

  • Integrated Sound Card: The device must have an integrated sound card.

  • Wireless Connectivity: The device must have an integrated wireless network card compatible with the Wi-Fi 6 standard or higher. It must also provide Bluetooth 5.1 or higher connectivity.
  • Input/Output Interfaces:
    • At least 2 USB 3.0 or higher ports, Type A.
    • At least 1 USB 3.0 or higher port, Type C. In the case of portable devices, at least one of them with DisplayPort + Power Delivery + USB functionality.
    • One RJ-45 Ethernet port (1 Gbps).
    • One HDMI 1.4 or higher port.
    • Audio I/O: At least one 3.5 mm combo jack interface for headphones and microphone.
    • In the case of a laptop, providing interfaces through docking station devices, port replicators, or similar is allowed.

  • Screen: In the case that the device is a laptop, it must have a minimum screen size of 13 inches.

  • Teclado: En el caso de los ordenadores de sobremesa, deberá proveerse un teclado español para asegurar la funcionalidad completa del dispositivo.

  • Mouse: Optical mouse equipped with at least two buttons and scroll function that ensures the full functionality of the device. In the case of laptops, the integrated mouse or touchpad will be accepted.

  • Webcam: At least HD resolution. Integrated webcam with a privacy shutter in the case of laptops.

  • Battery: In the case of laptops, smart battery or similar type.

  • Smartcard Reader (DNI-e): Smartcard reader that complies with the ISO-7816 standard. Integrated or non-integrated devices will be accepted.

  • Certifications: In the case of desktop and laptop computers, they must have at least one certification of the following types (or similar):
    • ENERGY STAR®.

    • EPEAT™ Silver Registered.

    • TCO.

  • Robustness: MIL STD 810H certification or equivalent. They must meet a minimum of 5 methods, including: high temperature, low temperature, and humidity.
  • The equipment will comply with the energy-related requirements established in accordance with Directive 2009/125/EC for servers and data storage, or computers and computer servers or electronic displays. The equipment used will not contain the restricted substances listed in Annex II of Directive 2011/65/EU, except when the weight concentration values in homogeneous materials do not exceed those listed in that annex. In these acquisitions, measures will be activated to ensure the purchase of energy-efficient equipment that is fully compliant with the “Code of Conduct for ICT” of the European Commission, and measures will be taken to increase the durability, repairability, upgradability, and reuse of the products and installed electrical and electronic devices. At the end of the useful life of the acquired digital technology, it must be treated in accordance with current legislation (including that the equipment will undergo preparation for reuse, recovery, or recycling operations, or appropriate treatment, including the removal of all fluids and selective treatment in accordance with Annex VII of Directive 2012/19/EU) and will not have a negative impact on environmental objectives.

  • In order to facilitate support tasks, remote management of computer equipment will be allowed through MDM solutions, equipment platforming, automatic recovery, or similar methods, enabling remote management, restoration, and optimal operation of the equipment. In such cases, compliance with current data protection legislation and the guarantee of digital rights, as well as any applicable regulations for these systems, must be ensured. The information collected in such cases will be the minimum necessary to provide the support service.

In the specific case of desktop computers:

  • Monitor: In the case of desktop computers, if there is no integrated monitor, a monitor must be provided that meets at least the following requirements:
    • Size: The monitor must have a screen size of a minimum of 23 inches.

    • Resolution: The monitor must have a minimum resolution of Full HD.

    • Display Technology: The monitor must have LCD, LED, or equivalent display technology.

    • Interfaces: At least 1 HDMI port.

    • Energy Label: The monitor must have the European Union energy label.

  • Wiring: The wiring for powering the devices is included, as well as an HDMI cable for the connection between the computer and monitor, if applicable.

Minimum security requirements:

  • Secure Boot: The device will have protective measures for the boot process against security attacks through malicious code, such as Secure Boot or similar.

  • TPM, T2, or Similar Chip, Depending on the Platform: The device will feature a TPM or T2 chip to strengthen system integrity, mitigate risks of cyberattacks, and provide a more solid foundation for security.

  • Biometric Identification: The device will implement (via hardware or operating system) biometric security elements, such as a camera for facial recognition or a fingerprint reader, to enhance access security to the system.

Advertising requirements:

The device must have an engraving or label affixed to the laptop or the computer and monitor (not on mice or keyboards). In case of replacement, the new equipment must be labeled or engraved under the same conditions as the equipment it replaces. The composition must include the following logos:

  • The emblem of the European Union (available at the link https://planderecuperacion.gob.es/identidad-visual), indicating “Funded by the European Union - Next Generation EU.”

  • The logo of the Recovery, Transformation, and Resilience Plan.

  • The logo of the Ministry for Digital Transformation and Public Function.

  • The logo of the Public Business Entity Red.es (It must appear as "Red.es").

 

Option for adhesive label:

The advising agent will affix an adhesive label to each laptop or computer and monitor on a visible surface with the following minimum technical characteristics:

Material:

  • Wear-resistant.
  • Water-resistant.
  • Solvent-resistant.
  • Light-resistant.
  • High-temperature resistant.
  • Abrasion-resistant.

    High break resistance.

Adhesive:

  • Vandal-resistant adhesive.
  • Permanent adhesive.
  • Universal adhesive adaptable to different surfaces.
  • Weather-resistant.
  • Resistant to temperatures from -40 ºC to +145 ºC.

Printing:

  • Accepts logos.
  • Long-lasting indelible ink.

Option for engraving:

As an alternative to affixing labels, each laptop or computer + monitor can be identified by engraving on clearly visible surfaces, using methods that are indelible and non-separable. Accepted methods include pantography, die-cutting, thermal engraving, or laser engraving. Any other method will require prior approval from Red.es.

Minimum requirements for maintenance and support service:

The Adhering Digital Agent must provide a Maintenance and Support service from the delivery of the devices that make up the solution until the completion of Phase 2 execution:

  • The delivery of the device must be made within Spain, and the digital agent must ensure the proper functioning of the delivered computing devices.

  • The device will be delivered already configured (at the hardware and software level), including all necessary updates.

  • There will be a support service for the beneficiary to resolve incidents, breakdowns, or configuration problems.

  • The support service will assist the beneficiary for a minimum of 8 hours a day for 5 working days a week (8x5). It must have an email to receive notifications of breakdowns or incidents, with a minimum service availability from 09:00 to 17:00 hours, Monday to Friday.

  • All necessary repairs must be carried out either through remote support or, if necessary, on-site at the location where the computing device was delivered. If it is not possible to make the repair on-site, the costs of packaging and transportation of the damaged equipment will be the responsibility of the digital agent. These repairs include both breaks or damages at the device level and configuration problems, as long as they are based on the correct use of the device.

  • The maximum repair time for the breakdown, from the communication of the incident to its resolution, will be 5 working days, with options such as on-site manufacturer warranty extension or equivalent mechanisms. If the repair is not achieved within that timeframe, a replacement device of equal or superior quality must be provided until the complete repair is made. The costs of delivering this replacement device, including packaging and transportation, will be borne by the digital agent.

Minimum requirements for the cybersecurity solution:

The device must incorporate a cybersecurity solution with the minimum requirements associated with the categories of solution X: Cybersecurity:

  • Antimalware: The solution must provide a tool that scans the device, its internal memory, and external storage devices.

  • Antispyware: The solution must provide a tool that detects and prevents spyware malware.

  • Secure Email: The solution must provide email analysis tools with the following features:
    • Antispam: Detects and filters out unwanted emails.
    • Antiphishing: Detects emails with links or malware suspected of being used to steal credentials.

  • Safe Browsing: Content control and anti-adware to prevent malicious ads.

  • Threat Analysis and Detection: The solution must allow for understanding the behavior of known and new threats.

  • Network Monitoring: The solution must provide tools that analyze network traffic and alert for threats.

  • Initial Configuration and Security Updates: An initial configuration must be performed for proper use, along with the respective updates for malware signatures and other threat detection data, as well as the required periodic security software updates.

  • Special Training Requirements: In addition to common training requirements, the training provided to the beneficiary must include guidance for configuring the security software, as well as a cybersecurity awareness kit to complement the solution with human firewall skills.

Possibility of acquiring associated hardware:

Once Phase II of the service is completed, the beneficiary may acquire ownership of the hardware by paying the adhering Digital Agent the residual value of the equipment.

The adhering Digital Agent is obliged to offer the option to purchase the Secure Workspace to the beneficiary. If the beneficiary does not pay the agreed residual amount, the adhering Digital Agent may recover the equipment.

The adhering Digital Agent must inform the beneficiary of the purchase value of the equipment at the end of the 12 months of service corresponding to Phase II. This amount that the beneficiary must pay will be the acquisition value of the equipment and must be reflected in the Digital Solutions Provision Agreement. At most, the purchase value will be 15% of the amount of the signed agreement (amount of the solution).

Need more information about the Digital Kit?

If you have questions about our solutions and how they fit with the Digital Kit program, please contact us. We will be happy to assist and advise you.