Tutasec

Protection plan

We have designed the best solutions for you to choose the best protection plan for your needs.

Basic
PYME
Corporate
Premium

24/7 monitoring

Cyber incident response

Incident investigation

Reports

Vulnerability Management reports

Risk Managements reports

Key-performance indicators reports

Cyber Security reports tailored at different business levels

Monthly Cyber security reports

Cyber Security Services Management

Endpoints & Server protection

Infrastructure Protection

Mobile Device Management & Security

Update and patch management

Patch Management

Cyber Security Tools Management

Cyber threat Monitoring.

Secure web access and end point protection

Cyber incident investigation

Data loss prevention

Cyber threat intelligence

Web browsing management

Back-ups Management

Centralized back-up management and administration

24/7 back-up monitoring

Back-up & Images Restored

Disaster recovery plan

Spam simulation

Implementing disaster recovery environment

Identity protection

Password policy management

Identity management

Identity protection

Password policy management

Role-based access control

Privileged access management

Computer security training

Computer security training

Simulations of attacks such as phishing to explain the risks in a more realistic way

Training in different types of threats, both internal and external

Carrying out measurements and monitoring of the training program within the company

Cyber incident response

Training and awareness-raising for cyber incident response

Monitoring compliance with computer security standards

Police Management, standards and Security system (ISO 27001, NIST)

Risk and compliance services

PCI DSS (Credit cards – Global level)

GDPR (Privacy Policy – European union)

ISO27001 (Global)

NIST

IT Asset Management

Cyber Security Process Management

Inventory Management of Endpoints, Mobile devices, servers, and Network Infrastructure

Secure Password management

IT Documentation Management

Reports

Compliance Management Reporting

Cyber Security Policy, Standards and Information Security Management System (ISMS)

Business Impact Assessment

Vulnerability Management

Threat Modelling

Risk Management

Compliance Management (NIST, ISO 27001, PCI DSS, GDRP, Privacy regulation)

Documentation of Policies and Standards to meet Cyber Security framework, and local & industry regulations

Improvement plans and Implementation of Controls

Security management system consulting

Enterprise security architecture

Information security governance, risk, and compliance

Preparation and consulting in the ISO27001 process

Cyber Security maturity assessment

Other services

Cyber Security Consultancy

Email security

Network Security management

Cyber Security Services Management

Cyber legal advice

Cyber incident response

Basic

  • Cyber incident response
    • Incident investigation
  • Reports
    • Vulnerability Management reports
    • Risk Managements reports
    • Key-performance indicators reports
    • Cyber Security reports tailored at different business levels
    • Monthly Cyber security reports
  • Cyber Security Services Management
    • Endpoints & Server protection
    • Infrastructure Protection
    • Mobile Device Management & Security
  • Patch Management
  • Cyber Security Tools Management
  • Cyber threat Monitoring.
  • Cyber incident investigation
  • Data loss prevention
  • Cyber threat intelligence
  • Web browsing management
  • Centralized back-up management and administration
    • 24/7 back-up monitoring
    • Back-up & Images Restored
  • Disaster recovery plan
    • Spam simulation
    • Implementing disaster recovery environment
  • Password policy management
  • Identity management
  • Identity protection
  • Password policy management
  • Role-based access control
  • Privileged access management
  • Computer security training
    • Simulations of attacks such as phishing to explain the risks in a more realistic way
    • Training in different types of threats, both internal and external
    • Carrying out measurements and monitoring of the training program within the company
  • Cyber incident response
    • Training and awareness-raising for cyber incident response
  • Police Management, standards and Security system (ISO 27001, NIST)
    • Risk and compliance services
    • PCI DSS (Credit cards – Global level)
    • GDPR (Privacy Policy – European union)
    • ISO27001 (Global)
    • NIST
  • IT Asset Management
    • Cyber Security Process Management
    • Inventory Management of Endpoints, Mobile devices, servers, and Network Infrastructure
    • Secure Password management
    • IT Documentation Management
  • Reports
    • Compliance Management Reporting
  • Cyber Security Policy, Standards and Information Security Management System (ISMS)
    • Business Impact Assessment
    • Vulnerability Management
    • Threat Modelling
    • Risk Management
    • Compliance Management (NIST, ISO 27001, PCI DSS, GDRP, Privacy regulation)
    • Documentation of Policies and Standards to meet Cyber Security framework, and local & industry regulations
    • Improvement plans and Implementation of Controls
  • Security management system consulting
    • Enterprise security architecture
    • Information security governance, risk, and compliance
    • Preparation and consulting in the ISO27001 process
    • Cyber Security maturity assessment
  • Cyber Security Consultancy
  • Email security
  • Network Security management
  • Cyber Security Services Management
  • Cyber legal advice
  • Cyber incident response

PYME

  • Cyber incident response
    • Incident investigation
  • Reports
    • Vulnerability Management reports
    • Risk Managements reports
    • Key-performance indicators reports
    • Cyber Security reports tailored at different business levels
    • Monthly Cyber security reports
  • Cyber Security Services Management
    • Endpoints & Server protection
    • Infrastructure Protection
    • Mobile Device Management & Security
  • Patch Management
  • Cyber Security Tools Management
  • Cyber threat Monitoring.
  • Cyber incident investigation
  • Data loss prevention
  • Cyber threat intelligence
  • Web browsing management
  • Centralized back-up management and administration
    • 24/7 back-up monitoring
    • Back-up & Images Restored
  • Disaster recovery plan
    • Spam simulation
    • Implementing disaster recovery environment
  • Password policy management
  • Identity management
  • Identity protection
  • Password policy management
  • Role-based access control
  • Privileged access management
  • Computer security training
    • Simulations of attacks such as phishing to explain the risks in a more realistic way
    • Training in different types of threats, both internal and external
    • Carrying out measurements and monitoring of the training program within the company
  • Cyber incident response
    • Training and awareness-raising for cyber incident response
  • Police Management, standards and Security system (ISO 27001, NIST)
    • Risk and compliance services
    • PCI DSS (Credit cards – Global level)
    • GDPR (Privacy Policy – European union)
    • ISO27001 (Global)
    • NIST
  • IT Asset Management
    • Cyber Security Process Management
    • Inventory Management of Endpoints, Mobile devices, servers, and Network Infrastructure
    • Secure Password management
    • IT Documentation Management
  • Reports
    • Compliance Management Reporting
  • Cyber Security Policy, Standards and Information Security Management System (ISMS)
    • Business Impact Assessment
    • Vulnerability Management
    • Threat Modelling
    • Risk Management
    • Compliance Management (NIST, ISO 27001, PCI DSS, GDRP, Privacy regulation)
    • Documentation of Policies and Standards to meet Cyber Security framework, and local & industry regulations
    • Improvement plans and Implementation of Controls
  • Security management system consulting
    • Enterprise security architecture
    • Information security governance, risk, and compliance
    • Preparation and consulting in the ISO27001 process
    • Cyber Security maturity assessment
  • Cyber Security Consultancy
  • Email security
  • Network Security management
  • Cyber Security Services Management
  • Cyber legal advice
  • Cyber incident response

Corporate

  • Cyber incident response
    • Incident investigation
  • Reports
    • Vulnerability Management reports
    • Risk Managements reports
    • Key-performance indicators reports
    • Cyber Security reports tailored at different business levels
    • Monthly Cyber security reports
  • Cyber Security Services Management
    • Endpoints & Server protection
    • Infrastructure Protection
    • Mobile Device Management & Security
  • Patch Management
  • Cyber Security Tools Management
  • Cyber threat Monitoring.
  • Cyber incident investigation
  • Data loss prevention
  • Cyber threat intelligence
  • Web browsing management
  • Centralized back-up management and administration
    • 24/7 back-up monitoring
    • Back-up & Images Restored
  • Disaster recovery plan
    • Spam simulation
    • Implementing disaster recovery environment
  • Password policy management
  • Identity management
  • Identity protection
  • Password policy management
  • Role-based access control
  • Privileged access management
  • Computer security training
    • Simulations of attacks such as phishing to explain the risks in a more realistic way
    • Training in different types of threats, both internal and external
    • Carrying out measurements and monitoring of the training program within the company
  • Cyber incident response
    • Training and awareness-raising for cyber incident response
  • Police Management, standards and Security system (ISO 27001, NIST)
    • Risk and compliance services
    • PCI DSS (Credit cards – Global level)
    • GDPR (Privacy Policy – European union)
    • ISO27001 (Global)
    • NIST
  • IT Asset Management
    • Cyber Security Process Management
    • Inventory Management of Endpoints, Mobile devices, servers, and Network Infrastructure
    • Secure Password management
    • IT Documentation Management
  • Reports
    • Compliance Management Reporting
  • Cyber Security Policy, Standards and Information Security Management System (ISMS)
    • Business Impact Assessment
    • Vulnerability Management
    • Threat Modelling
    • Risk Management
    • Compliance Management (NIST, ISO 27001, PCI DSS, GDRP, Privacy regulation)
    • Documentation of Policies and Standards to meet Cyber Security framework, and local & industry regulations
    • Improvement plans and Implementation of Controls
  • Security management system consulting
    • Enterprise security architecture
    • Information security governance, risk, and compliance
    • Preparation and consulting in the ISO27001 process
    • Cyber Security maturity assessment
  • Cyber Security Consultancy
  • Email security
  • Network Security management
  • Cyber Security Services Management
  • Cyber legal advice
  • Cyber incident response

Premium

  • Cyber incident response
    • Incident investigation
  • Reports
    • Vulnerability Management reports
    • Risk Managements reports
    • Key-performance indicators reports
    • Cyber Security reports tailored at different business levels
    • Monthly Cyber security reports
  • Cyber Security Services Management
    • Endpoints & Server protection
    • Infrastructure Protection
    • Mobile Device Management & Security
  • Patch Management
  • Cyber Security Tools Management
  • Cyber threat Monitoring.
  • Cyber incident investigation
  • Data loss prevention
  • Cyber threat intelligence
  • Web browsing management
  • Centralized back-up management and administration
    • 24/7 back-up monitoring
    • Back-up & Images Restored
  • Disaster recovery plan
    • Spam simulation
    • Implementing disaster recovery environment
  • Password policy management
  • Identity management
  • Identity protection
  • Password policy management
  • Role-based access control
  • Privileged access management
  • Computer security training
    • Simulations of attacks such as phishing to explain the risks in a more realistic way
    • Training in different types of threats, both internal and external
    • Carrying out measurements and monitoring of the training program within the company
  • Cyber incident response
    • Training and awareness-raising for cyber incident response
  • Police Management, standards and Security system (ISO 27001, NIST)
    • Risk and compliance services
    • PCI DSS (Credit cards – Global level)
    • GDPR (Privacy Policy – European union)
    • ISO27001 (Global)
    • NIST
  • IT Asset Management
    • Cyber Security Process Management
    • Inventory Management of Endpoints, Mobile devices, servers, and Network Infrastructure
    • Secure Password management
    • IT Documentation Management
  • Reports
    • Compliance Management Reporting
  • Cyber Security Policy, Standards and Information Security Management System (ISMS)
    • Business Impact Assessment
    • Vulnerability Management
    • Threat Modelling
    • Risk Management
    • Compliance Management (NIST, ISO 27001, PCI DSS, GDRP, Privacy regulation)
    • Documentation of Policies and Standards to meet Cyber Security framework, and local & industry regulations
    • Improvement plans and Implementation of Controls
  • Security management system consulting
    • Enterprise security architecture
    • Information security governance, risk, and compliance
    • Preparation and consulting in the ISO27001 process
    • Cyber Security maturity assessment
  • Cyber Security Consultancy
  • Email security
  • Network Security management
  • Cyber Security Services Management
  • Cyber legal advice
  • Cyber incident response
Cotizar planes.
Separador

Contamos con un equipo experto en seguridad informática para asesorar a nuestros clientes en la protección de su información.

Quotation plans.
Separador

We have an expert team in computer security to advise our clients on the protection of their information.