“Our clients’ assets require a holistic approach towards security in order to guarantee compliance with existing regulation and ensure business continuity.  The effective establishment of physical and logical barriers is a necessary condition yet not sufficient: these must be complemented with a sound definition of processes, roles and responsibilities, which will rely upon secure network and application architectures. Asset operation, maintenance and evolution must be intrinsically bound to security policies


Our added value proposal includes:

Initial consultancy

Initial consultancy in the form of gap analyses and discovery workshops so as to determine our client’s context, situation and process needs:

  • Security audits.

Assessment of alternatives

Evaluation of alternatives – at process, asset and technology levels:

  • Implementation of security within business processes: policies, roles and responsibilities.
  • Asset protection strategies.
  • Technological alternatives.

Design and implementation of secure networks

  • Physical security:
    • CCTV, access and intrusion control.
  • Cybersecurity:
    • Security by design: traffic modelling and segmentation.
    • Bastion equipoment: firewalls, IPS (intrusion prevention systems).
    • Security within endpoint devices.
    • Network traffic analysis.

Operation & Maintenance

  • Monitoring of services and applications.
  • Incident and data analytics.

Integration of systems in operational control centres

  • PSIM – Physical Security Information Management System.
  • SIEM – Security Information and Event Management System.