Skip to main content
Logo GMV

Main navigation

  • Sectors
    • Icono espacio
      Space
    • Icono Aeronáutica
      Aeronautics
    • Icono Defensa y Seguridad
      Defense and Security
    • Icono Sistemas Inteligentes de Transporte
      Intelligent Transportation Systems
    • Icono Automoción
      Automotive
    • Icono Ciberseguridad
      Cybersecurity
    • Icono Servicios públicos Digitales
      Digital Public Services
    • Icono Sanidad
      Healthcare
    • Icono Industria
      Industry
    • Icono Financiero
      Financial
    • Icono Industria
      Services
    • All Sectors

    Highlight

    SouthPAN
    GMV, a key provider for advanced positioning services in Australia and New Zealand
  • Talent
  • About GMV
    • Get to Know the Company
    • Team
    • Corporate Social Responsibility
    • Location
    • All About GMV
  • Communication
    • News
    • Events
    • Blog
    • Magazine GMV News
    • Press Room
    • Media Library
    • Latest from GMV

Secondary navigation

  • Products A-Z
  • GMV Global
    • Global (en)
    • Spain and LATAM (es - ca - en)
    • Germany (de - en)
    • Portugal (pt - en)
    • Poland (pl - en)
    • All branches and all GMV sites
  • Home
  • Sectors

Cybersecurity

We cover the entire cybersecurity life cycle: identify, protect, detect, respond, and recover

  • Print
Contact
GMV Cybersecurity
https://www.youtube.com/watch?v=Lub9mHOCMUE
Overview

Global handling of cyber risks

At GMV, we are committed to treating cyber risks globally, identifying existing threats, protecting assets, detecting attempted attacks, and, if they occur, recovering as soon as possible, all orchestrated with the most powerful management systems. 

Milestones

maintenance_Galileo

Operation and maintenance of cybersecurity in the Ground Segment of ESA’s Galileo system since 2018

ATM

Over 200,000 ATMs in around 40 countries protected with Checker ATM Security

virtualPAC

Launch of the award-winning VirtualPAC solution for the rollout, management, and secure operation of an OT network

harmony

Privacy and cybersecurity by design within the framework of the Harmony project, which researches blood cancers

GMV_CERT

GMV-CERT at the Boecillo Business Park, Valladolid, since 2017, with FIRST certification

smartkey

Innovative solutions for connected vehicles: biometric smart keys and intrusion detection system

Solutions and Services

Cybersecurity

Cybersecure Infrastructures
Visibility
  • In cybersecurity, you can’t manage what you don't know. A lack of knowledge is generally due to a lack of vision of what is happening.
  • It is possible to anticipate most cyber incidents by accurately analyzing many sources of information and if both the technology and professionals are prepared to manage it in real time or after the fact.
  • If you have access to your organization’s cybersecurity activity information, do you just store it or do you use it to make the best decisions?

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

Data
  • Data has become one an organization's most valuable assets, and thus boosting their appeal to criminals.
  • The digital transformation depends on data, so cybersecurity must be present by design and by default.
  • Data are generated, obtained, exploited, stored, transmitted… What cybersecurity and privacy controls do you apply in each of these stages?
     

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

Cloud
  • The cloud is here to stay in all sectors, handling data and running business-specific applications as a any other part of corporate infrastructure, though sometimes it is underused.
  • It offers a new, faster, larger-scale, and more robust way of providing cybersecurity services.
  • Do you leverage all of the capabilities offered by the cloud to detect advanced malware or stop denial of service attacks?

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

SecDevOps
  • DevOps is the new paradigm that is taking hold because of the benefits it offers when developing and rolling out corporate applications, which requires a working method.
  • SecDevOps incorporates cybersecurity controls into the different phases of the DevOps iterative cycle, integrating fully into that cycle.
  • How can the interests of the development, operations, and cybersecurity departments be aligned?  
     

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

Anti-fraud
  • Detecting and preventing fraud requires the best talent working with the best technology on multidisciplinary teams, however managing these teams is a real challenge. 
  • Artificial intelligence is a reliable method that can be fully customized to the type of fraud to be fought.
  • Do you make a positive contribution to the bottom line by fighting fraud effectively?

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

Incident, Role, and Access Management
  • Identity management is probably the key pillar of cybersecurity on all levels and, paradoxically, it tends to be pushed aside due to how difficult it is to define and implement.
  • It can be covered by the corporate scope, e.g., making it part of the entire organization's identity, specifically, e.g., managing privileged users, or globally, e.g., identity on the cloud for cases requiring mobility.
  • How are you going to manage your identity in the face of the imminent avalanche of IoT devices?

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

ATM Security

Checker ATM Security® is a world-class cybersecurity product specifically designed for ATMs and kiosks. Checker® will help you protect your ATMs from logical fraud while meeting applicable PCI-DSS requirements quickly and effectively, even for unsupported versions of the ATM operating system.

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

uQuery

Language Technologies for the New Challenges of Digital Communication

Consultancy
Vulnerability Management
  • Behind every cyberattack is an unresolved vulnerability that is taken advantage of by criminals.
  • It is not only a matter of discovering vulnerabilities in your systems, but also ensuring that they are resolved.
  • Would you know how to manage the vulnerabilities of thousands of assets in your organization?

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

Compliance
  • There is a growing number of laws and regulations that demand certain levels of cybersecurity and privacy, in addition to those previously on the books.
  • In addition to being mandatory, compliance is an opportunity to evolve the level of cybersecurity and privacy in your organization.
  • Would you be able to demonstrate that your organization has implemented the measures required by current legislation in the event of a reported cyber incident?
     

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

Forensic Analysis
  • The truth is that negligent behaviors must be from organized groups or even people from your organization must be organized.
  • Reconstructing past actions that have caused damage to the organization is a very effective improvement and learning method, determining the who, what, when, why, and how.
  • If your organization is the victim of data theft, how would you gather the evidence you need to determine liability?
     

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

GMV-CERT
Cyberintelligence

Cyberintelligence

  • An organization can generate several thousand cybersecurity alerts a month, which must be analyzed.
  • We can properly interpret the information available to us either in real time or through specific investigation in order to make better decisions.
  • Can you see everything that is happening both in and outside your organization and prepare appropriately to minimize any impact?

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

Success Stories

Media

Mesa de debate: Ciberseguridad #Santander32
Video
Mesa de debate: Ciberseguridad #Santander32
Javier Zubieta en SedianDAY19
Video
Javier Zubieta en SedianDAY19
Webinar: Ciberseguridad en lenguaje entendible (Javier Zubieta)
Video
Webinar: Ciberseguridad en lenguaje entendible (Javier Zubieta)
What is Checker ATM Security? (GMV)
Video
What is Checker ATM Security? (GMV)
Car Hacking, de Angelina Jolie a Charlize Theron (Carlos Sahuquillo)
Video
Car Hacking, de Angelina Jolie a Charlize Theron (Carlos Sahuquillo)
Webinar: Seguridad con ELK, cómo verlo todo y poder contarlo (José Pedro Mayo)
Video
Webinar: Seguridad con ELK, cómo verlo todo y poder contarlo (José Pedro Mayo)
Webinar: Anatomía de un ciberataque, ¿cómo podemos mitigarlo? (Paula González)
Video
Webinar: Anatomía de un ciberataque, ¿cómo podemos mitigarlo? (Paula González)
Webinar: Ciberamenazas reales que acechan a nuestro sistema sanitario
Video
Webinar: Ciberamenazas reales que acechan a nuestro sistema sanitario
Webinar: DevSecOps, Optimización segura del ciclo de vida de las aplicaciones
Video
Webinar: DevSecOps, Optimización segura del ciclo de vida de las aplicaciones
More media

News

Norma ISO SAE
  • Automotive
  • Cybersecurity
GMV collaborates in defining the new ISO / SAE 21434 standard on cybersecurity in automotive engineering
futuristic
  • Cybersecurity
Cyberdefense and cybersecurity in a virtual world that affects us all
ciberseguridad
  • Industry
  • Cybersecurity
Incorporating cybersecurity in the supply chain in an industrial environment

Contact

Münchener Straße 20
82234 Weßling
Deutschland
Tel. +49 (0) 8153 28 4226

Friedrichshafener Straße 7
82205 Gilching
Deutschland
Tel. +49 (0) 8105 77670 150

Europaplatz 2
64293 Darmstadt
Deutschland
Tel. +49 (0) 6151 3972 970

Contact menu

  • Contact
  • GMV around the world

Blog

  • Blog

Sectors

Sectors menu

  • Space
  • Aeronautics
  • Defense and Security
  • Intelligent Transportation Systems
  • Automotive
  • Cybersecurity
  • Digital Public Services
  • Healthcare
  • Industry
  • Financial
  • Services
  • Talent
  • About GMV
  • Shortcut to
    • Press Room
    • News
    • Events
    • Blog
    • Products A-Z
© 2023, GMV Innovating Solutions S.L.

Footer menu

  • Contact
  • Legal Notice
  • Privacy Policy
  • Cookie Policy
  • Impressum

Footer Info

  • Commitment to the Environment
  • Financial Information