• products / technology
We detect threats and find the right solution using the following technologies
Social media intelligence
Find influencers
Understand relevance
Predict threats
Identify critical networks
Mitigate the risk
Latin American law enforcement organizations, media organizations, and political figures use social media tools to see what is happening behind the official media, which helps them solve crime, react more quickly to breaking events, and communicate directly with constituents.
Cyber security
Network security
Vulnerability assessment
Cyber security risk identification
Incident response
Cyber security training
There is high customer interest in cyber security. Customers need to know what their vulnerabilities are and how to protect their networks. We can provide pen tests, courses, and advice to companies on how to identify and mitigate cyber threats.
Secure communications
Secure cellphones
Satellite phones
Private switch
Communications advisory services
The explosion of digital communications in Latin America has been accompanied by a lack of real privacy across cellphones and networks. We are regularly asked for assessments of network security, and one of our responses - depending on the threat - is encrypted cellphones. We have a suite of technology and can recommend various solutions depending on the scenario, from private switches to personal satcom links.
Protecting critical infrastructure
State of the art cameras
Acoustic sensors
Perimeter security
Cargo tracking
Access control
Sensitive facilities, be they private companies or government institutions, require integrated access control technology and the ability to follow, track and account for people and things. We have state of the art low-light and concealed cameras, and we can integrate the perimeter security with access control. We use access identification systems incorporating biometric data on individuals, and we employ RFID in open and hidden scenarios, on objects (and on persons who are concerned about kidnapping threats).
Vulnerability Assessment
Intelligence Training
Cyber security and safety