Introduction to Security Audits
Providing Services and Technology Solutions for the security of Information Systems since 1993
Our services seek to identify an organization’s state of security by means of two complementary approaches: an information systems risk analysis or by comparison with a standard.
Application life-cycle security
GMV not only analyzes application security from different points of view (black-box testing, privilege escalation, source code review, etc) but also grafts on security as an ongoing process throughout the whole life cycle of any corporate application.
GMV determine an organization’s degree of technological protection against any malicious activity from inside or outside with the aim of minimize the impact of Advanced attacks.
Compliance audits determine the gap between the real and desired (Ley Orgánica de Protección de Datos: LOPD), the Information Society Services Act (Ley de Servicios de la Sociedad de la Información: LSSI), the National Security Scheme (Esquema Nacional de Seguridad: ENS) or PCI (Payment Card Industry).
In-company cybersecurity attacks and incidents rose by 45% in Q1 of 2017, according to the figures of...
Industry is being hit by just the same threats and vulnerabilities as the IT world. Pundits argue that...