Risk analysis

It is the basic instrument to assist the management of a site in evaluating the most appropriate efforts for the protection of its assets and developing the necessary recommendations to correct the security deficiencies found.

Security Reports

We regularly deliver to our clients the latest trends and/or patterns of robberies, kidnappings, etc., as well as our recommendations to avoid being victims of insecurity.

Auditor Inspectors

Specialized and trained personnel in the supervision and management of audits of the surveillance service process in each of the projects.

Specialized technical staff

To analyze and determine “IT” technological vulnerabilities in your networks, your servers, your system, in your information backup, etc., in order to guarantee the computer security of your company.


Regarding the technical standard ISO 27,001 (information security management system), the ISO 27,002 standard (control objectives and recommendable controls regarding information security) and the ISO 27,003 standard (information audit).

This web site uses cookies for a better experience. By using this website, you accept our Data protection policy.
Read more