Tailored services adapted to meet any context
A tailor-made complete service integrated into the quality system at your company, the objective is to optimise protection and prevent risks which affect assets which are an active part of the continuity and good performance of your property and/or corporate activity: policies, procedures, organisational structures, software and hardware.
We review the security of the control systems used in your automated industrial processes, no matter the supplier or protocols used, and even in the production environment. We have extensive experience in diverse industrial sectors, including, among others, pharma, food and textile.
We secure your app codes, website systems and desktop clients prior to production. By doing this, we are protecting real-time integrity and availability.
External apps and services are among an organisation's key assets, so their security is vitally important. We examine and assess all of them to root out any serious problems (code injection, buffer overload, impersonation, etc.)
We check the security of your network and internal systems to assess possible security breaches which may be exploited by an internal hacker, e.g. users who access the network through poorly protected wifi networks, or disgruntled employees or co-workers.
Smartphones and tablets tend to contain confidential information and access to critical company services, so it is highly important to maintain their security. What is more, as they are small, it is easier for them to "go missing". Thus, reviews of corporate applications and mobile devices should be part of everyday security processes which need to be included during cyber security overview campaigns.
Having trustworthy operating systems and apps is vitally important. Our experience in generating secure operating systems models, using good market practices and suitable configurations and applications to ensure the highest level of security without affecting performance, will provide you with the level of trust you need in a secure system. We work with today's leading operating systems: Windows, Mac OS, Unix/Linux-based clients and servers, etc.
Proper segmentation of the various networks is vital to prevent any unauthorised access. They need to be isolated and segmented by VLANs based on business casuistry. In addition to segmentation, perimeter security (firewalls) is necessary, as this analyses traffic and blocks possible threats detected within network traffic. This means any possible source of infection in a subnet will be controlled and snuffed, so it cannot extend through the network, which is thus protected from common threats such as ransomware. Here we can help in definition and configurations, advising you on how to solve your main problems.
We advise and help you deploy the leading cyber security measures on the market, increasing your organisation's security level:
Cyber Intelligence gathers and analyses data to generate useful information which will enable the decision-making process when facing a series of previously examined matters. This is used in the business world to identify exfiltrated data, control brand image, or alert people to a possible cyber attack under way. Among our main cyber intelligence services are the following:
Nowadays, access to high-quality spyware is easier than ever: the lack of regulation of the world market and technology being developed and available cheaply means private matters - such as board meetings, private conversations or governing bodies - are more vulnerable than ever before.
At Osane Consulting, we have accredited experience and foreign training (USA, Russia) in electronic countermeasures, so nothing can interfere with the security of your communications.
We perform telephone scanning on analogue and digital lines and VoIP. We use telephone analysers like the TALAN DPA-700 V.3, specialised software and network analysers to detect:
We provide electronic countermeasure services (ambient and telephonic), technical investigation and consultancy services and supply counter-intelligence equipment.
* Services available throughout Spain and in other countries (consult us)
We use cutting edge technology and our own methodology to locate any active or passive spying devices that could compile or transfer illicit information (audio or video).