Network of Partners

Currently DEFSEC Cybersecurity has a platform of partners in the field of Cybersecurity of different types: Research Centers, Engineering Services Companies, OEM Manufacturers, Integrators and MSSP.

Given the diverse expertise of each of its partners, DEFSEC is able to offer a comprehensive response to any customer need. The business model is extremely agile and efficient given the regime agreed arrangements, where all they see thus reinforced their access to new customers.


System Integrators

They are companies whose activity is focused on the development of final systems that require the integration of third-party solutions or tools, as well as their deployment in the client's systems. The rest of the partners can act as subcontractors or their natural suppliers. Some systematic companies may be providers of Managed Security Services (MSSP).


AMBAR is a global and innovating Partner which provides technological solutions and services related to Communications and IT handling the whole project lifecycle thanks to its capabilities for system integration, SW/ HW development, commissioning and Integral Logistic Support.

AMBAR is present in the Defence & Security, Traffic Management, Health, Energy and Public Administrations markets.

AMBAR Solutions and Services considered within this commercial collaboration domain are the following:

  • IT Networking
  • Cybersecurity
  • Unified Communications (data/voice)
  • Structured cabling and CPDs
  • Security Solutions
  • Videoconference and Advance Multimedia Management Systems
  • ICT Managed Services
  • Energy optimization solutions

ACORDE Sistemas is a company specialized in the development and integration of IT solutions for the land, naval, air and satellite domains.

Its areas of specialization are:

  • Development of custom embedded systems
  • SW Development Services (Web / desktop Apps, Databases, Devops, etc)
  • Logical Perimeter Security
  • Routing and switching
  • Servers and Storage
  • Virtualization
  • Wireless networks
  • Health Network Monitoring
  • VoIP communications
  • Physical security (CCTV and Access Control)

Managed Cybersecurity Service Providers (MSSP)

The MSSPs are companies that offer Managed Advanced Services to the market through their NOCs / SOCs from where their clients' business processes are monitored and managed, among which is the Cybersecurity of their IT / OT networks.


CISGA is an AMBAR Group company specialized in Outsourcing and provision of Advanced Managed Services to its clients, through its NOC / SOC, which include Managed Security Services.

The main Services provided by CISGA are:

Managed Cybersecurity Services (SOC)
Information Systems Consulting
Business Process Outsourcing (BPO)
IT staff outsourcing (Selection and Training)


OEM Manufacturers

Refers to Original Equipment Manufacturers (OEM) related to the Solutions domains in which DEFSEC has some expertise. All the selected OEMs are characterized by owning differential and competitive solutions in their respective fields.


REDBORDER is the trademark of ENEO, developer of SW solutions for Cyber Attack Monitoring in IT networks. ENEO belongs to the Basque INNOVALIA group that specializes in the development and commercialization of IT solutions for the industry, as well as in the Consultancy for the Digital Transformation of the Industry.

Nozomi Networks is a company specialized in industrial security and operational visibility against cyberattacks of Industrial Control Systems (ICS).

It develops and markets its OT Cybersecurity Monitoring solution consisting of IDS attack detection probes (Scada Guardian) and a Control Console and Centralization Module for all deployed probes (Central Management Console).

PROOFPOINT is an integrated suite of solutions in the cloud that protects the users of an organization and its associated information, by protecting email and its brand image reputation against cyber attacks (phishing, social networks, etc.), helping organizations to mitigate critical security risks and regulatory compliance.

 

In addition, PROOFPOINT offers the solution for PROOFPOINT META Remote Workstation Securization. It constitutes a software defined network (SDN) in the cloud (VPN infrastructure in cloud offered as a service) that allows users to directly connect to services or applications of the company hosted both in their CPD and in the public Cloud. The employee connection is established directly without the need for the company to establish a VPN network and from the corporate EndPoint (installed agent) or through any Endpoint through the web browser

The DIGITAL GUARDIAN platform is a tool, available in VM or Appliance, focused on preventing data leakage by monitoring the data flow circulating through the network, email or the web (Digital Guardian Network DLP), as well as in the Endpoints ((Digital Guardian Endpoint DLP).

The cyber threat intelligence platform that provides timely information and actionable intelligence to protect your assets relative to the following fundamental aspects:

  • Credentials. Discovery of stolen personal credentials and for sale on the web
  • Credit cards. Identification of credit card numbers and stolen keys.
  • Dark Web. Malware Detection, Exploits and attack vectors to the client network.
  • Data Leakage. Information leak detection from the client's network and third parties (consultants, auditors, etc.)
  • Domain protection. Detection of compromised domains (future phishing attacks)
  • Hacktivism. Hacktivist content detection aimed at customer organization and blocking it in hacktivist forums.
  • Mobile Apps. Detection and blocking of fraudulent mobile apps (illegitimate use of customer brand image)
  • Social media. Detection of unauthorized uses of brand image and smear campaigns for the brand or VIP staff.

DLP (Data Loss Prevention) solution that protects confidential data against silver threats by portable storage devices, cloud services and mobile devices.

The EndPoint Protector DLP solution consists of the following independently deployable functional modules:

  • Content Aware Protection. Monitor and control what confidential data may or may not leave the network through several exit points. Filters can be defined by file type, application, predefined content and custom content, regex and more.
  • Device Control Management. Control and configure the level of security on network devices (laptops or desktops). Display security settings, network configuration, applications, etc.
  • Forced encryption. Automatically protect sensitive data sent by email or to external storage devices with 256-bit AES encryption.
  • Mobile Device Management. Manage, control and configure the level of security on smartphones and tablets. Display security settings, network configuration, applications, etc.

 

MANAGE ENGINE offers a complete suite of tools (ME DESKTOP CENTRAL), as a product or in SaaS format, for the IT administration of any type of Organization. Its solutions allow to properly manage the following aspects:

  • Vulnerability management and automatic patching
  • Remote Software Implementation and Management
  • Network and Server Management
  • Active Directory Management
  • Endpoint Management (PCs and Mobile Devices)
  • Audit and Reporting

KASPERSKY offers comprehensive Cybersecurity solutions aimed at both IT and OT Networks and available as a product or SaaS. There are solutions adapted for Micro, SMEs or large corporations, highlighting the following:

  • Kaspersky ENDPOINT SECURITY CLOUD (KESC). It offers protection of IT networks against threats via Email, Web and malicious files, Ransonware Prevention, Detection of Vulnerabilities and Patching, as well as Discovery and blocking of uncontrolled IT services in the Cloud or Access control to the Web and external devices.
  • Kaspersky ASAP (K-ASAP). It constitutes an on-line Training platform for employees in basic aspects of Cybersecurity (Awareness). The platform allows an automated customization of each trainee training plan and includes both theoretical (micro-video or training pills) and practical content (simulated phishing attacks, etc.)
  • Kaspersky INDUSTRIAL CYBERSECURITY (KICS). It offers protection of OT networks (Industrial Control Systems) by network DPI traffic inspection using IDS and flow probes (KICS for Networks), as well as monitoring abnormal behaviors and vulnerabilities in industrial control devices (KICS for Nodes).

OARO offers the market a series of reliable identification and information certification solutions based on Blockchain technology complemented by Artificial Intelligence (AI) and implemented through its Cloud platform.

OARO solutions are aimed at guaranteeing the Physical, Logical Security and Traceability of the information and documentation and are the following:

  • OARO ACCESS: Innovative HW / SW facial recognition solution combined with thermographic image to prevent unauthorized access or possible infectious. The system guarantees total anonymization of user data
  • OARO ID: Secure facial recognition software that streamlines user onboarding and advanced authentication in online environments. Security in the identification and login of employees.
  • OARO COMPLY: Industry without papers and more efficient with document management software that digitizes any type of document and allows to guarantee traceability and chain of custody through the different workflows. Security Compliance in critical, forensic, legal or hyper-regulated processes.
  • OARO MEDIA: Solution for taking geolocated and immutable photographs and video (assessment of maintenance tasks, obtaining of forensic evidence, insurance reports, etc)
  • OARO API Rest: API for the client or other integrator to integrate the blockchain platform into their own security solution (validation of the data exported by the client's solution)

METACLEAN es una solución desarrollada por ADARSUS para el tratamiento y eliminación de metadatos que previenen la fuga de información sensible a través de los mismos. Con esta herramienta se evita que esta información pueda ser usada por terceros para realizar acciones maliciosas comprometiendo la seguridad e imagen de su empresa u organización, evitando además cuantiosos gastos económicos por posibles acciones legales.

 

Actualmente ADARSUS es la empresa líder en la creación y distribución de software para evitar la fuga de información a través de metadatos en documentos ofimáticos y ficheros multimedia.

 

METACLEAN es una Solución registrada en el Catálogo de Soluciones de Seguridad TIC del INCIBE (CPSTIC).


Engineer Consulting

They are companies focused on the provision of Engineering Consulting Services related to Cybersecurity, such as SW Validation and Certification companies, SW Development Consultants, IT Audit Consulting or Process/ IT personal outsourcing companies.


SQS is a company of the INNOVALIA group, specialized in the development of tests and validation of SW (Test & AQ). SQS has extensive experience in both critical security systems and commercial applications.

Among the most representative products are:

SQS TestWORKFLOW: An intuitive tool to manage the entire validation process
Q-Mobile: Simple and effective application for Mobile App App Test.
Agile REQ: A simple, intuitive and efficient requirements management tool.
Q-Load: Tool to know the maximum number of users that a system can support and the response times to different load volumes.

CISGA is an AMBAR Group company specialized in Outsourcing and provision of Advanced Managed Services to its clients, through its NOC / SOC, which include Managed Security Services.

The main Services provided by CISGA are:

Managed Cybersecurity Services (SOC)
Information Systems Consulting
Business Process Outsourcing (BPO)
IT staff outsourcing (Selection and Training)

LEET Security is an independent agency accredited by ENAC and whose methodology has been approved by the CCN, ENISA and INCIBE for the qualification of the security of ICT services.

The qualification system managed by LEET Security constitutes the first implementation of the recommendation of the EU Cybersecurity Strategy, to create ICT security labeling systems.

LEET activities, as a rating agency, basically covers two types of services, both of which entail the issuance of the corresponding certified seals:

  • CYBERSECURITY QUALIFICATION Service in accordance with its own methodology and the main applicable standards (PCI DSS, LOPD, C4V ENSI).
  • CERTIFICATION SERVICE in accordance with ENS (National Security Scheme).

Cybersecurity qualification can be carried through either by a filed audit or directly by the client, using the SaaS tool (E_Qualify) implemented with an online questionnaire.


R&D Centers

They are organizations whose activity is focused on Research & Development around Defence & Security solutions, providing technologically innovative solutions to the other companies along the Global Supply Chain.


The ITCL is the Reference R&D Center in Castilla y León acting under the legal status of a private foundation. ITCL focuses its Research and Development activities in the areas of Virtual Reality Simulation, Electronic Artificial Intelligence, Energy Technologies, Production Technologies, ICTs, Industrial Automation, Mobility and Transportation and Training.

ITCL solutions contemplated in the field of commercial collaboration are the following:

  • Simulation and Virtual/Augmented Reality
  • IT defence solutions
  • Electronics artificial intelligence
  • Training

PARTNERS
AMBAR
ACORDE Sistemas
CISGA
REDBORDER
NOZOMI
PROOFPOINT
DIGITAL GUARDIAN
BLUELIV
ENDPOINT PROTECTOR
MANAGE ENGINE
KASPERSKY
OARO
METACLEAN
SQS
LEET
ITCL