Group 16Created with Sketch.

Cyber Security

At Light Eyes we are specialists in cyber security. Not only do we find and solve problems with cyber defence services, thus maintaining the company's value chain, but we also avert worries by always being one step ahead with our cyber intelligence services.

We adapt to your needs.

We have created packs to cover the current needs of companies with respect to the most important aspects of cyber security. Each pack features a set of solutions with the most important measures in each area and allows customers to benefit from a discount that they would not have if purchasing the services separately. Any of the package services can also be contracted individually.

Firewall Pack

Don’t have a firewall, or it’s not managed? This is the best one for you. We offer all kinds of Firewalls to suit the needs of your company, and add continuous monitoring, so that it is always up to date.

Includes:

  • Installation and purchase of the Firewall
  • Creation or revision of security policies
  • Monitoring
  • First two months of monitoring free

Installation and purchase of the Firewall (if required):

  • If you do not have a Firewall yet, we propose the ideal Firewall, one meeting the needs of your company and averting every possible problem. We also take care of the installation, placing the Firewall in the ideal position within the network, depending on its topology.

Creation or revision of security policies:

  • We will create or optimise your company’s external policies based on the services it features. We will configure the appropriate protection depending on the scope of you company and activate the necessary antivirus services, Web filtering and VPNs.

Monitoring:

  • We will follow up on your Firewall and apply the necessary updates whenever necessary, thereby protecting you from new forms of attack.
  • Our services are monitored by our SOC on an on-going basis. This follow-up is done through 24×7 alerts and deliverables that are sent to your company monthly.

First two months of monitoring free

  • If you did not have Firewall before, you will have access to two free months of monitoring for placing your trust in us.

Vulnerabilities Pack

Do you want to know your company’s vulnerabilities, for both your computers and users? If you want to know what you need and the improvements you need, this is the ideal option.

Includes:

  • External vulnerability analysis
  • Internal vulnerability analysis
  • Policy Review
  • Social engineering

External vulnerability analysis:

  • Intrusion tests covering services external to the entire range of existing public addresses and company-owned applications.
  • Intrusion tests are necessary to verify the degree of insecurity existing at an organisation from the point of view of an attacker who wishes to extract information from it. A series of attacks of all kinds are carried out on the servers of the organisation exposed on the Web, in order to prepare an intrusion and obtain confidential information and/or modify sensitive information.

Internal vulnerability analysis:

  • Analysis of the vulnerability of servers, applications on the servers, and Wi-Fi networks.
  • The internal intrusion phase seeks to ascertain the degree of insecurity at the organisation seen from the point of view of a disgruntled worker or an Internet attacker who has obtained privileges.
  • A series of attacks are carried out on servers, wireless access points, PCs and other devices connected to the company’s network, with the aim of obtaining privileges and confidential information.

Policy Review:

  • Analysis of cyber security policies (backup, passwords, VPN, Firewall, etc.) and delivery of a document outlining policies recommended for the client.

Social engineering:

  • Visit by our technicians to the facilities and the detection of problems at the organisation: indiscreet post-its, open access, unprotected CPD, sensitive documentation not supervised by staff …

Intelligence Pack

What can one find on the company on the Net? What business data exists on the different types of websites? With this pack we examine the business information leaks that have occurred and the information available to criminals to attack.

Includes:

  • Dark Web Analysis
  • Deep Web Analysis
  • Common Web Analysis

Dark Web Analysis:

  • We look for information involving the company’s domain data on the Dark Web to see whether it is at risk of being attacked. The more data we find on the Dark Web, the more likely the company is to be targeted.

Deep Web Analysis

  • We find leaks of company information on the Deep Web, whether it is passwords, confidential or private information … anything that cybercriminals can use to mount attacks.

Common Web Analysis

  • We run an exhaustive search on the Web in search of any type of information that could influence or negatively impact your company or its workers.

Premium service

Prevention Pack

Do you want to know your attack risk index? Your vulnerabilities to external attacks? If you want to take action before it’s too late, this pack is essential.

Includes:

  • Dark Web Analysis
  • Deep Web Analysis
  • Common Web Analysis
  • External Vulnerability Analysis
  • Policy creation, revision or optimisation

Dark Web Analysis:

  • We look for information involving the company’s domain data on the Dark Web to see whether it is at risk of being attacked. The more data we find on the Dark Web, the more likely the company is to be targeted.

Deep Web Analysis:

  • We find leaks of company information on the Deep Web, whether it is passwords, confidential or private information … anything that cybercriminals can use to mount attacks.

Common Web Analysis:

  • We run an exhaustive search on the Web in search of any type of information that could influence or negatively impact your company or its workers.

External Vulnerability Analysis:

  • Intrusion tests covering services external to the entire range of existing public addresses and company-owned applications.
  • Intrusion tests are necessary to verify the degree of insecurity existing at an organisation from the point of view of an attacker who wishes to extract information from it. A series of attacks of all kinds are carried out on the servers of the organisation exposed on the Web, in order to prepare an intrusion and obtain confidential information and/or modify sensitive information.

Policy creation, revision or optimisation:

  • Analysis of cyber security policies (backup, passwords, VPN, Firewall, etc.) and delivery of a document outlining policies recommended for the client.

Others

In addition, as a cyber security company, we offer other products and services that are not included in any package.

These include:

  • Disaster Recovery Plan
  • Antivirus
  • Email Encryption
  • Total Email Protection
  • Mobile Device Manager
  • Consulting and advisory services

We inform you on the global solutions of auditor, security and development

Call us +34 93 249 14 05 and

BitmapCreated with Sketch.

Join our newsletter

You will receive new blog posts, cybersecurity recommendations and our exclusive offers.