LOGICAL SECURITY - SECURITY CONSULTING
TELCONET Security Consultancies are projects Design, Implementation, Monitoring, Support and Information Security Certification of a company, based on efficient and recognized PMI methodology for project management. Thanks to these projects, customers can implement a Security Information Technology policy which includes from physical access to restricted access to IT resources.
Consultancies will have as deliverable documents containing information of design, complete designs or secure network implementations, security policies and ademdums contracts, among others.
OUR TARGET MARKET
Companies subject to compliance with security certifications (Saban-Oxley, Basel II, etc.).
Companies that have relationships with suppliers and or international customers requiring similarcertifications.
Companies that need to audit the security in its technology platform.
RESOURCES / PARTNERS MARKET LEADERS
Security Consultants Certificated Staff (Certified Ethical Hacker - EC Council
Master in Information Security, ES-CERT members / Cisco Security Instructors)
Complementary certifications in network and systems (CCIE CCNP CCDP CCDA CCNA CCIA CCDA Linux)
ISO27001 Leader Auditor / ISO27001 Lead Instructor
TELCONET is the first service provider in Ecuador, with an ISO 27001 Certification Information Security
TELCONET is associated with leading vendors in the security market
TYPES OF CONSULTANCY WE OFFER
SECURE INFRASTRUCTURE DESIGN CONSULTANCY:
Design and / or implementation secure technology solutions in all layers of the OSI model.
ISO 27001 IMPLEMENTATION CONSULTANCY:
Consists of specific advice to the company to implement the model and lead it to international certification.
Consists of specific advice to the company to help it implement the model BS 25999-2:2007, which is a Management Systems in business continuity.
INFORMATION SECURITY AUDITS:
We verify the compliance of a Management System Information Security.
Measure the technical strengths of the client's security infrastructure, simulating a real attack by a hacker.
Identify actual technical vulnerabilities of the client's security infrastructure.
Measure the strengths on the technical and operational security infrastructure of customer information by simulating real attack techniques such as hacking, social engineering, physical access, tampering, etc.
In-house courses of any of the above security issues.