Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

Training on the GDPR (in Spanish)

Through this course you will learn, in a very simple and understandable language, all the requirements and new obligations established by the new General Regulation of Data Protection of Europe (GDPR), which replaces the LOPD.

You will be assigned a personal tutor, who will be a certified teacher of Data Protection Delegate with professional experience in the regulations.

 

Training to become a Data Protection Delegate (in Spanish)

This is the essential training to practice as a DPD.
The aim of this course is to train new professionals who will become Data Protection Delegates, either within the company itself or as a service provided to other entities. A sector in full growth.

This course is based on the Official Schema developed by the AEPD for the Certification of Data Protection Delegates.

You can choose between the 100h course or the extended 180h course which includes the final project of complete adaptation and simulation of the certification examination.

Training on LSSICE (in Spanish)

Specialized training to learn about the new Organic Law on Personal Data Protection and Digital Rights Guarantee (LOPDPGDD).
Throught this course you will learn, in a very simple and understandable language, all the requirements and new obligations established the new Organic Law 3/2018, of 5 December, of Personal Data Protection and guarantee of digital rights (LOPDPGDD).

Redborder

Redborder is a cybersecurity solution based on Open Source, Big Data, and traffic analysis accompanied by a set of active probes managed in an integrated manner. This platform unifies in real time the different data sources provided by redborder Apps and Probes or by other manufacturers, enabling easy creation of customizable dashboards and reports to support deployments like Netwok Visibility, Critical Infrastructures Security, Wifi Security, or Security Operation Centers.

Simarks Deployment Manager

Based on a patented technology of privilege management at process level, Simarks SDM allows to build an application corporate catalog where the end user is who installs the applications without granting him administrator permissions. This approach allows
complete implementation of the principle of least privilege without affecting the productivity.

Simarks BestSafe

Simarks™ BestSafe™ is a tool focused on privilege management for any Microsoft Windows operating system version and edition running on any workstation, desktop, laptop or server running on any physical, portable or virtualized hardware.

The main goal of BestSafe™ is to allow administrators to assign any application/process the security context it has to be executed with, no matter which user credentials it was created with. However, BestSafe™ also offers complete support for traditional per user privilege management.

Mercury

Mercury is an all-in-one solution that defines zones and conduits, encrypts communications and provides active security and advanced threat resistance with a seamless deployment.

By encrypting communications, Mercury virtually isolates the load side from the rest of the world. Thanks to its key-management system grants secure access and enables policy access-rights.

Mercury is a unified security solution: it provides all the elements required in active security in a single product that does not require downtimes during the deployment process.

Ethical Hacking Services

SKIT Cyber security (SKIT) has more than eighteen years of experience in IT security field, assisting a multitude of companies in different sectors. SKIT team has been involved in a broad range of projects dealing with penetration testing:

•Ethical Hacking/Penetration Testing ICT systems (infrastructure, network, application, mobile iOS and Android)

•Ethical Hacking/Penetration Testing Industrial systems (Scada/ICS)  •Ethical Hacking/Penetration Testing IoT systems

Security Advisory service

The Security Adivisory Team of @Mediaservice.net provides two different categories of services:

  • Analysis & Testing: it assesses the level of safety of a defined area, both from a technological and organizational point of view.
  • Compliance & Governance: improves safety management, and ensures compliance with laws and market standards

@Mediaservice.net also provides the well-known ISECOM certification courses, plus professional training courses focused on three different IT/ICT security issues:

Consulting services

BL4CKSWAN SRL offers four kinds of services:

Pages

News

The pandemic has shown the importance of international supply chains and how dependent we are. Attacks in the virtual space may have an increasing impact on supplies in our analogue world.