Information security

Services

We offer advanced cybersecurity services and consultancy for information systems and communications.

Security Evaluation Laboratory

  • Common Criteria: We are approved as Information Technology Security Evaluation Facility (ITSEF) within the National IT Security Evaluation and Certification Scheme (ENECSTI), to perform IT security evaluations according to "Common Criteria for Information Technology Security Evaluation".

  • LINCE: we are working on the trial evaluation.

Consultancy on Products Certification and Systems Accreditation

We have generated documentation and provided support consultancy:

    Products certification:
  • Common Criteria
  • LINCE
  • ITSEC

  • Systems accreditation:
  • CCN STIC - Classified Information
  • ENS - Esquema Nacional Seguridad

Security Systems Operation

We offer support for Security Operations Centers (SOC).

  • Security tools monitoring
  • Incident response
  • Monitoring
  • Incident investigation

Intrusion tests

Internal audits reports which make possible to predict the weaknesses and vulnerabilities in companies information systems.

  • Pen-testing in wireless and wired networks
  • Web applications
  • Services
  • Platforms

Assessment and Risk Analysis

Analysis and management of risks in information system according to standard methodologies that will allow knowing the critical assets of your company and improve the response to any security incident.

Networking

We look for the best solution for your company in an environment where the communication is the key issue.

  • Analysis
  • Design
  • Monitoring
  • Evaluation

Blockchain

Design and development of blockchain solutions, where privacy, peer permissioning and high performace is required. We also perform security assessment of blockchain architectures.

Authentication and Access control solutions

We use the latest technologies for securing identity and access management systems:

  • NFC
  • Smartcards
  • Bluetooth

Bespoke software development

Management and system applications, web applications, databases technologies and mobile apps:

  • Programming languages: C, C#, Java, Python
  • Web and databases: HTML5, Django, Neo4j, PostgreSQL
  • Mobile apps: Android, iOS, Windows

About us

Clover Technologies laboratory is accreditated as Security Evaluation Laboratory to perform security evaluations according to Common Criteria.

Since April 2019 our laboratory is approved as Information Technology Security Evaluation Facility (ITSEF) within the National IT Security Evaluation and Certification Scheme (ENECSTI), to perform IT security evaluations according to "Common Criteria for Information Technology Security Evaluation" and "Common Methodology for Information Technology Security Evaluation".

Clover Technologies winner of the first EDA Defence Innovation Prize

Clover Technologies won the prize in the category ‘Integration of multi-robot swarming concepts in support of future defence capabilities in the area of GNC’ with an idea based on a blockchain-based solution to provide a common platform for swarm nodes with an extra security layer.

Swarm robotics is an emerging technology present in the Future Operational Environment of almost every European nation. However, before it can be implemented in real scenarios, the challenges still pending related to swarm robotics – i.e. computational and storage limitations, heterogeneous communication protocols, information security, etc. – must be solved.

Our certifications

We have acquired several accreditations and our employees hold several security certifications listed below:

Contact

Are you looking for more information? Plase contact us and we will answer all your questions.

  • Company
  • Clover Technologies SL
  • Address Avenida Juan Caramuel 1 - 28919 - Leganes - Madrid - Spain
  • Phone
  • Information Contact
  • HR Contact
  • Procurement Contact
  • Complaint Contact
  • Evaluation Laboratory Contact