Introduction to Security Audits
Providing Services and Technology Solutions for the security of Information Systems since 1993
Our services seek to identify an organization’s state of security by means of two complementary approaches: an information systems risk analysis or by comparison with a standard.
Express Security Check
The COVID19 pandemic has forced many firms to set up remote access for their employees to guarantee business continuity. There is a risk that this contingency rollout might have introduced some vulnerabilities into the remote-access systems, particularly VPNs and Virtual Desktop Infrastructure (VDIs). Our aim is provide security experts with a rapid security check of remote-access systems, focusing on an identification of the most important vulnerabilities [To find out more].
Application life-cycle security
GMV not only analyzes application security from different points of view (black-box testing, privilege escalation, source code review, etc) but also grafts on security as an ongoing process throughout the whole life cycle of any corporate application.
GMV determine an organization’s degree of technological protection against any malicious activity from inside or outside with the aim of minimize the impact of advanced attacks.
Compliance audits determine the gap between the real and desired (Ley Orgánica de Protección de Datos: LOPD), the Information Society Services Act (Ley de Servicios de la Sociedad de la Información: LSSI), the National Security Scheme (Esquema Nacional de Seguridad: ENS) or PCI (Payment Card Industry).