DATA SECURITY<br />Your Security beginshere!<br />
The Company<br />DATA SECURITYis formed by professionals with over 15 years of experience in information security and computer forensics international market.<br />We are ready to offer training and consulting solutions appropriate to the volume of your business.<br />
CurrentScenario<br /><ul><li>Companies lose millions of dollars in damage to computers every year. .
Hours of unavailability take consumer confidence.
Virtual threats become more sophisticated, often causing damage to businesses and home users.</li></li></ul><li>Suchincidentsthreatenyours ...<br />Information, an ESSENTIAL asset for the business, which requires adequate protection to add value for people, processes and technology.<br />The information can exist in several forms: <br />Printed.<br />Writed.<br />Electronicallystored. .<br />Spoked in conversations, etc.<br />
To protect your information…<br />There is information security, which aims to protect the information of the various threats that surround it, ensuring:<br />Its use onlybyauthorizedpersons (Confidentiality);<br />They are reliableandnotcorrupted (Integrity); and<br />The assurancethatcanbeusedwhennecessary (Availability).<br />
Information Security<br />DATASECURITYpresents various services, such as:<br />Incident Response<br />We operate from consulting to full outsourcing services of monitoring your environment in search of irregularities related to information security.<br />RiskAnalysis<br />The scope of our consultancy can include analyses in business, people, technologies, systems, incident response, continuity and availability, compliance, policies and procedures, and other items relevant to your company.<br />
Information Security<br />DATASECURITYpresents various services, such as: <br />GAP Analysis ISO 27000 and PCI-DSS<br />We conducted an analysis of your company in relation to prescriptive as the family ISO 27000 and PCI-DSS, allowing you to diagnose the most critical points of information security.<br />Penetration Test<br />Our analysis allows to recognize vulnerabilities in your network perimeter and assessing their risks, and also provide subsidies for corrections and preventive measures.<br />
Information Security<br />DATASECURITYpresents various services, such as:<br /> Business ContinuityPlan<br />We assist in planning focused on creating a set of strategies and action plans to ensure that essential services are properly identified and preserved after a disaster, going up the return to normal operation.<br />Security Policy<br />We formulate or re-formulate your security policy showing possibles problems and gaps in their items and we can do a awareness campaign with your employees.<br />
But if there is something wrong?<br />Exists the Computer Forensics, that makes it possible to investigate devices such as computers, cell phones and other media to determine the cause of an incident and the possible culprits. We have procedures for:<br />Collection, preservation and analysis of evidence; <br />Production of the expert report; <br />Aid in possible disputes.<br />
Computer Forensics<br />DATASECURITYpresents various services, such as:<br />Investigation of mobile devices <br />Research on mobile phones and smartphones allows a quick view of equipment usage through registration information as text messages, call history, photographs, list of phones, among other features.<br />Corporate Fraud<br />Investigation of several illicit in enterprises, be they authored by employees, partners or customers.<br />
Computer Forensics<br />DATASECURITYpresents various services, such as:<br />Digital Crime<br />We work in the investigation of crimes such as fraud, tax evasion, counterfeiting (piracy) and other crimes that require the use of computational resources of expertise.<br />Storage Media<br />This investigative process, those information found in these devices and the data that was retrieved even after their elimination.<br />
But, if I want to learn?<br />Rely on our courses that allow you to train it for more than 300 hours in various technical and management training in information security and electronic crimes investigation! <br />Practical courses with the vision of internationally renowned professionals in information security!<br />