Cyber Security
IT architecture, applications and configurations are constantly changing. Technical assessments provide critical protection of the organization's assets, enabling the adoption of appropriate technical measures to comply with current Habeas Data legislation. Our Security Area has extensive technical experience in conducting penetration assessments (Ethical Hacking and Vulnerability Assessment) in organizations.