СНПЧ А7 Пенза, обзоры принтеров и МФУ

LOGICAL SECURITY - SECURITY CONSULTING

TELCONET Security Consultancies are projects Design, Implementation, Monitoring, Support and Information Security Certification of a company, based on efficient and recognized PMI methodology for project management. Thanks to these projects, customers can implement a Security Information Technology policy which includes from physical access to restricted access to IT resources.

Consultancies will have as deliverable documents containing information of design, complete designs or secure network implementations, security policies and ademdums contracts, among others.

OUR TARGET MARKET
Companies subject to compliance with security certifications (Saban-Oxley, Basel II, etc.).
Companies that have relationships with suppliers and or international customers requiring similarcertifications. 
Companies that need to audit the security in its technology platform.

RESOURCES / PARTNERS MARKET LEADERS

Security Consultants Certificated Staff (Certified Ethical Hacker - EC Council
Master in Information Security, ES-CERT members / Cisco Security Instructors)
Complementary certifications in network and systems (CCIE CCNP CCDP CCDA CCNA CCIA CCDA Linux)
ISO27001 Leader Auditor / ISO27001 Lead Instructor
TELCONET is the first service provider in Ecuador, with an ISO 27001 Certification Information Security
TELCONET is associated with leading vendors in the security market

TYPES OF CONSULTANCY WE OFFER

SECURE INFRASTRUCTURE DESIGN CONSULTANCY:
Design and / or implementation secure technology solutions in all layers of the OSI model.

ISO 27001 IMPLEMENTATION CONSULTANCY:
Consists of specific advice to the company to implement the model and lead it to international certification.

BCP DEVELOPMENT:
Consists of specific advice to the company to help it implement the model BS 25999-2:2007, which is a Management Systems in business continuity.

INFORMATION SECURITY AUDITS:
We verify the compliance of a Management System Information Security.

ETHICAL HACKING:
Measure the technical strengths of the client's security infrastructure, simulating a real attack by a hacker.

VULNERABILITY ANALYSIS:
Identify actual technical vulnerabilities of the client's security infrastructure.

PENETRATION TEST:
Measure the strengths on the technical and operational security infrastructure of customer information by simulating real attack techniques such as hacking, social engineering, physical access, tampering, etc.

TRAINING:
In-house courses of any of the above security issues.

 

 

CONTACT US


Guayaquil (main office): +593 4 2680555 /6020650
Location: Kennedy Norte Mz. 109 S. 21

Quito: +593 2 3963100 / 6020650
Dirección: Av. 12 de Octubre N24-660 y Francisco Salazar, Edificio Concorde Piso 1 Oficina 1B

Cuenca: +593 7 4134501
Loja: +593 7 2585848
Manta: +593 5 2627815
Salinas: +593 4 2779528
Quevedo: +593 5 2762652
Machala: +593 4 2680555 Ext. 1161
Ibarra: +593 2 3963100 Ext. 1183
+593 9 8385 7270
Ambato: +593 9 87592220

Information: This email address is being protected from spambots. You need JavaScript enabled to view it.
Human Resources: This email address is being protected from spambots. You need JavaScript enabled to view it.

PORTFOLIO SERVICES

TELCONET VIDEO

WIFI COVERAGE