Tailored cyber security to protect your digital business

We help you protect your data and applications

Why incorporate cybersecurity into your digital strategy?

  • Detect security flaws before attackers do.
  • Complies with current regulations (RGPD, ENS, ISO…) without complications.
  • Protect the data of your company, your users and your customers.
  • Integrate security into the development cycle (DevSecOps).
  • Increase the trust and reputation of your digital brand.

Cybersecurity services we offer

Hugo Palomar

Pentesting and ethical hacking

We simulate controlled attacks on your systems to discover real vulnerabilities before third parties do. We adapt to each case with white, grey or black box testing, and we work on web, mobile, APIs, IoT or cloud infrastructure.

→ We deliver an executive report with findings and recommendations, based on OWASP standards, including a final re-test after corrections.

More information →

Cyber defence and monitoring

We advise you on how to protect your digital assets and detect threats. We install passive monitoring systems, configure security alerts, analyse logs and audit configurations. Ideal for companies with their own technical team that need external reinforcement.

→ We work with open source tools such as WazuhSnortSuricata or ELK Stack.

More information →

Regulatory and legal compliance

We help you comply with regulations such as the RGPDENSISO 27001NIS2 or DORA, depending on the level of digitisation and the data your company manages. We are not a legal consultancy, but we are experts in translating technical and operational regulations.

→ We include advice, model policies, certification support and the possibility of contracting our CISO as a Service.

More information →

Secure programming and DevSecOps

We review your code to identify vulnerabilities, we help you to integrate good security practices in the development, and we train your team if necessary. We use SAST and DAST tools such as SonarQubeSnyk or OWASP ZAP, always with a practical focus.

→ Ideal for internal or third party projects where you want to ensure the quality and security of the code.

More information →

How do we work?

1. Personalised initial diagnosis

2. Technical or regulatory audit as required

3. Executive report with identified risks and action plan

4. Accompanying implementation or resolution

5. Follow-up and revalidation (if required)

Common cases in which we help

Ecommerce with high exposure to users and payment data.

Technology companies that want to strengthen their development and QA.

Businesses that need to comply with GDPR or the ENS in order to contract with the administration.

Startups seeking security from the outset.

Internal IT teams in need of specialised support.

Frequently asked questions about our cybersecurity services