OUR OFFERING PORTFOLIO

Cybertech, thanks to its ability to analyze the sector and industry, is able to design, implement, manage and support solutions that combine innovation with business reality in the following areas:

  • Security Governance, Risk e Compliance, is a single set of controls to monitor key business processes and governance procedures. This centralized approach has the advantage of reducing redundancy and can be applied at the macro level, across the enterprise, or focus on a single process.
  • Identity & Access Administration and Governance, is the set of processes and technologies for the administration, provisioning, governance and analytics of identities, access control of systems and applications. It includes Identity Lifecycle Management: creation, maintenance and withdrawal of profiles and credentials. It manages the following processes: access request, new user approval, certification, risk calculation and separation of duties (SOD).
  • Security Intelligence & Analytics, allows to analyze sizable amounts of data, applying business intelligence functions at all levels of the technological layer. The infrastructure, application and data components, provide contextual information that helps identify real time vulnerabilities, allows to record and certify security events based on SLAs (Service Level Agreements), as well as supporting forensic analysis and regulatory compliance.
  • Network and Virtual Infrastructure Protection, a combination of hardware and software services and technologies that guarantee the security of networks and physical infrastructures, with particular attention to virtual networks.
  • Security Assessment, the methodology for identifying IT security vulnerabilities and risks. Its main goal is to ensure that security controls are integrated into critical business infrastructures, applications and paths. In the light of the Recovery Remediation scenarios presented, managers will be able to decide how to effectively allocate resources and define the necessary actions.
  • Workstation, end-point & mobile security, defines how to protect End-Points and make all infrastructures stronger and safer, including different types of devices (desktop, laptop, tablet or smartphone). Includes mobile APP development services through the Mobile App Development Platform (MADP) and the implementation of Enterprise Mobility Management technologies.
  • IT Service & Asset Management, is based on an ITIL v3 framework (IT Infrastructure Library) which enables the design and delivery of integrated solutions for various services such as Service Fulfillment (delivery and automation of service desk processes), Service Assurance (availability and performance of IT services), Enterprise Asset Management, and Property & Facility Management.