Cybersecurity and Risks
Prot-On
Protect what you share
Information Rights Management (IRM) solution for:
- Automatically classify information, label it, and protect PDF, Office, text, video, audio, and photo documents.
- Apply policies to enforce who, when, and for access to protected files.
- Control access to each document and modify its permissions.
Included in the Secure Communications category of the Ministry of Economic Affairs and Digital Transformation’s DIGITAL KIT
DIGITAL KIT PROGRAMME CO-FINANCED BY THE NEXT GENERATION (EU) FUNDS OF THE RECOVERY AND RESILIENCE MECHANISM
Kymatio
Human Cyber Risk Management
The leading application to mitigate the risks that threaten organizations’ employees through:
- Information Security and Cybersecurity Assessment and Awareness Program
- Surveillance of exposed credentials
- Social Engineering Training
nebulaSUITE
- nebulaCERT: AR Services, Centralization and Management of Digital Certificates
- nebulaID: Video identification for the issuance of qualified certificates
- nebulaSIGN: Allows the creation of workflows with different types of signatures
- nebulaDISCOVER: Discovery, auditing, and monitoring of all digital certificates
- nebulaACCESS: Adaptive Multi-Factor Dynamic Authentication.
Included in the Electronic Invoicing category of the Ministry of Economic Affairs and Digital Transformation DIGITAL KIT
DIGITAL KIT PROGRAMME CO-FINANCED BY THE NEXT GENERATION (EU) FUNDS OF THE RECOVERY AND RESILIENCE MECHANISM
Datos 101
Get on the cloud
The easiest, cheapest and fastest cloud solution on the market, with different service options:
- Migration of on-premises, physical or virtual infrastructure to the cloud
- Cloud Disaster Recovery
Ethon Shield
Hacking ético
Detección de Ciberataques en:
- Telecommunications networks and WIFIs
- Drones, boats, cars, and IoT