We offer advanced cybersecurity services and consultancy for information systems and communications.
Common Criteria: We are approved as Information Technology Security Evaluation Facility (ITSEF) within the National IT Security Evaluation and Certification Scheme (ENECSTI), to perform IT security evaluations according to "Common Criteria for Information Technology Security Evaluation".
LINCE: We are accredited as Security Evaluation Laboratory by the Certification Body according to LINCE methodology.
We have generated documentation and provided support consultancy:
We offer support for Security Operations Centers (SOC).
Internal audits reports which make possible to predict the weaknesses and vulnerabilities in companies information systems.
Analysis and management of risks in information system according to standard methodologies that will allow knowing the critical assets of your company and improve the response to any security incident.
We look for the best solution for your company in an environment where the communication is the key issue.
Design and development of blockchain solutions, where privacy, peer permissioning and high performace is required. We also perform security assessment of blockchain architectures.
We use the latest technologies for securing identity and access management systems:
Management and system applications, web applications, databases technologies and mobile apps:
Since April 2019 our laboratory is approved as Information Technology Security Evaluation Facility (ITSEF) within the National IT Security Evaluation and Certification Scheme (ENECSTI), to perform IT security evaluations according to "Common Criteria for Information Technology Security Evaluation" and "Common Methodology for Information Technology Security Evaluation" and since July 2019, is approved to perform evaluations according to LINCE methodology.
Clover Technologies won the prize in the category ‘Integration of multi-robot swarming concepts in support of future defence capabilities in the area of GNC’ with an idea based on a blockchain-based solution to provide a common platform for swarm nodes with an extra security layer.
Swarm robotics is an emerging technology present in the Future Operational Environment of almost every European nation. However, before it can be implemented in real scenarios, the challenges still pending related to swarm robotics – i.e. computational and storage limitations, heterogeneous communication protocols, information security, etc. – must be solved.
We have acquired several accreditations and our employees hold several security certifications listed below:
Laboratorio del Esquema Nacional de Evaluación y Certificación de la Seguridad de las Tecnologías de la Información.
Standard ISO/IEC 17025 for the competence of testing and calibration laboratories
Standard UNE-EN ISO 9001:2015 for IT security consulting, web application and outsourcing.
Certified Ethical Hacker, Certified Security Analys, Computer Hacking Forensic Investigator, Certified Secure Programmer, Network Security Administrator.
ISACA Certified Information Security Manager.
ISC2 Certified Information Systems Security Professional.
Are you looking for more information? Plase contact us and we will answer all your questions.