We analyse the security structure of the IT infrastructure.
Fortification of the client's IT structure.
Forensic analysis of the different devices to obtain information.
We collect and analyse data in order to generate valuable information.