Services

The Future is a Phygital World

Application Security

We guide development teams on the best practices for application security.

Application Security
  • Design and implementation of structured cabling
  • Source Code Review
  • Secure Development Workshop
  • Software Architecture Review
  • Certification of the implemented environment following international standards
  • Complete approval of the deployed environment
  • Complete technological documentation As Built
  • Development of the Playbook for implementing the standard that will be adopted in the next development steps.

Attack & PenTest

Figital Security's offensive security experts identify your company's main vulnerabilities and security holes before real attacks impact business results, brand reputation or the confidentiality of the company's information and that of its customers.

Attack & PenTest
  • Pentest
  • Red Team
  • Vulnerability Scan
  • APT/Ballistics
  • Threat Modeling
  • War Games

Cloud Security

To ensure an organization is ready for the rapidly approaching cloud native future, it must prepare for new security challenges.

Cloud Security
  • Cloud Security Review
  • Security Compliance Assesment
  • loud Application Protection
  • Cloud infrastructure protection
  • Proxy Cloud
  • Cloud Security Workshop

Cloud Backup

With LGPD, companies need to protect both their own and their customers' data as much as possible, in addition to ensure business continuity against data loss.

Backup em Nuvem
  • Online Backup Scheduling;
  • Access via the web;
  • Backup reports;
  • Cryptography and Compression;
  • Backup and Restore Policies;
  • Compliance with the General Data Protection Law (LGPD);
  • Compliance with ISO 27001;
  • Backup of Operating Systems, Machine, Virtual, Databases and Files.

Network Security

Our ultra-fast internet speed allows your company to be more productive.

Network Security
  • Email gateway (antispam)
  • VPN Gateway
  • Automated management of rules and policies
  • NG firewall
  • NG ips next generation intrusion prevention system
  • Advanced Threat Protection (apt)
  • Web gateway (proxy)

End Point Security​

The endpoint is usually the gateway to most security threats in your company. It is crucial, therefore, to protect the workstations of employees, partners and third parties, whether they are computers, notebooks or mobile devices such as cell phones and tablets connected to the network. With the advancement of home office, the challenges have increased, so it is essential to invest in protection and security solutions suitable for your environment.

End Point Security​
  • EDR (endpoint detection and response)

    Responsible for detecting security anomalies, commands, instructions, and suspicious threats arriving at an endpoint
  • EPP (Endpoint Protection)​

    Provides protection against malware, ransomware and is a top-tier threat prevention solution
  • ENCRYPTION (data, media and flows)

    Essential for additional protection of your company's sensitive information or personal data, it increases the degree of security and confidentiality of information

Identity Management

Services that allow the management of the credentials and access of an organization's users, controlling and protecting the usage rights of each employee.​

Identity Management
  • Strong MFA Authentication​
  • Credential Management (Password Vault)
  • Credential management (endpoint)
  • Password Less

Data Security​

Data-driven companies are those that direct their processes and operations based on structured and integrated analysis of information and data. As data-based strategy has become a competitive differentiator in business, maintaining data integrity and security is essential for the companies’ future. ​

Data Security​
  • CASB - Cloud data protection
  • Security Control for Devops​
  • DLP - Data Leak Prevention​
  • Information Classification

Datacenter Security​

An adequate and tested recovery plan that ensures the company's development

Datacenter Security
  • Physical intrusion testing
  • Crash and Disastery Recovery Plan Simulation and Test
  • Business Continuity Implementation
  • Physical security level audit ​
  • High Availability Architecture (Active Asset)

Property Security

A vandal-resistant video security system for high-value environments.

  • Security coverage throughout the environment;
  • Quality images in environments with poor visibility;
  • Cost reduction of up to 50% in the area of property security;
  • 24-hour remote access from anywhere via the internet;
  • Flexibility and scalability using the same data infrastructure technology;

Device management

Our cybersecurity experts take care of your company's security controls.

Device management
  • Security Device Adm Ads:

    Administration and management of your company's security controls, keeping these technologies updated, integrated, and properly configured, in accordance with the best security practices. The environment is managed 24X7 remotely.​
  • SI Technical Support

    Throughout this service, we offer an activity aiming to promptly respond to customer incidents that make the computing environment unavailable or partially compromised.

365 Proactive Monitoring (SOC)

We have the most advanced monitoring and incident control tools to ensure that our customers have the best availability rates.

Monitoramento 365 Proativo (SOC)
  • Availability:

    We use a robust system with automation to ensure greater availability of your IT environment
  • Agility:

    We make decisions quickly and accurately. Minimizing system downtime costs.
  • Security:

    Get high performance with reinforced security from our SOC to protect your company.

Personalized Service

To keep your stores safe and available, we work with certified professionals prepared to act quickly in a mission-critical environment.​

Atendimento Personalizado​
  • Personalized service experience;
  • Delivery with national coverage;
  • Omnichannel service: Email, chat, phone, app;​
  • First contact SLA: 15 minutes;
  • Methodologies: KC’S, ITIL, ISO/IEC 20,000, COBIT;
  • Professionals: qualified and committed to solving problems;
  • Unlimited Service: No limits on hours or tickets.