IT Services

There were 430 million new unique malware, up 36 percent. Email is the prefered vehicle of delivery, we know how to protect it!

Watch Video

Standards and Regulations

Evaluate the security situation of the organization, according to regulatory or industry standards, safety standards, corporate or local, national or international, and support the adoption and compliance of these regulatory bodies.

- ISO 27001
– Payment Card Industry – Data Security – Standard (PCI-DSS)
– Law of Protection of Personal Data
– Circular SBS N ° G-140

Best practices

Support in the effective implementation of security controls that lead to de fi nition, formalization, protection, monitoring and response to situations that threaten the security of information.

- Classification of Information
Awareness Awareness
– Training of Incident Response Teams
– Security Policies and Procedures – Informatics and Information Security
– Data Center Security Assessment

Business Continuity

Prepare the company or institution to respond and recover from situations that endanger the continuity of critical activities of the organization.

-Diagnosis and Implementation of Business Continuity Plan (BCP)
-Diagnosis and Implementation of Technological Continuity Plan (DRP)
-Implementation and audit of ISO22301

Risk Management

Evaluate and guide in the remediation or mitigation of the security risks in the technological platforms and in the processes related to its administration.
– Network Architecture Assessment
– Vulnerability Assessment
– Evaluation of configuration of security devices
Log Evaluation
Application Security Assessment
Security Assessment of Industrial Networks (SCADA)

Customizable IT Management Services

Improve your business operations with our full suite of customizable managed services. Every day we deliver advanced technologies and services to solve today’s complex communications challenges.

  • Asset Tracking | Understand your current communications network capital deployment with comprehensive asset tracking, including End-of-Life (EOL) and End-of-Manufacturer-Support (EOMS).
  • Capacity Planning | Efficiently provision current and future IT capacity with a fine-tuned review of applications and infrastructure.
  • Change Management | Adopt change to improve efficiencies with detailed planning, best practices, tools, and techniques.
  • Configuration Control | Gain life cycle performance control with proven disciplines for hardware and software systems: planning; identification; configuration; accounting; and verification/audit.
  • Deployment Delivery | No matter where you are, we are there. With a national footprint, we can quickly organize large-scale deployments of qualified, trained technicians and project managers.
  • Project Management | You’ll receive a uniform application of directives, policies, and performance metrics through our four-step methodology: project initiation; planning and design; project execution; and project completion.
  • Release Management | Protect your live environment while enabling changes in a controlled manner for a trouble-free “go live”.

Evolving Technology on an OPEX Budget with Adaptive Engagement Modeling

You can take advantage of new and emerging technologies without being limited by prohibitive capital expenditures with our exclusive Adaptive Engagement Modeling. We’ll deliver a customized solution from our menu of services and technologies bundled within a recurring operational expense. This approach enables your IT department to accelerate the deployment of new technologies while dramatically reducing the need to budget for future capital and operational expenditures. As your operation evolves, Black Box services and technologies can be adapted to your changing requirements. This modeling enables you to smartly and cost-effectively close the gap between your current IT environment and the IT requirements that meet your organization’s long-term business goals.