top of page
—-Fondo-Landing-Webinar--Conoce-a-un-hac
Security that evolves with you, without friction or your own infrastructure
Fondo-Ciberseguridad_Pymes_Nordstern.png

Comprehensive Cybersecurity Package
for companies of all sizes

Nordstern CaaS: Turn cybersecurity into a service, not a burden.

The COVID-19 pandemic accelerated digital transformation for businesses. This situation managed to maintain the availability and operation of their services, but increased their cyber risk, making them a perfect target for cybercriminals. We are now at the highest peak of cyberattacks in the world, and they continue to rise.

To address this challenge, Nordstern has designed a package of eight premium Cybersecurity as a Service services to build a solid strategy within your business's reach.

Illustration_Pentesting_Ethical_Hacking_Pru

Talk to a consultant right now on WhatsApp

¡Gracias por tu mensaje!

It's time!
Take your business to the next level of security.

Have you ever wondered what would happen if your company fell victim to a cyberattack?

In addition to the significant economic impact it could cause, its reputation would also be jeopardized, and it could even lead to the complete paralysis of the company if all information is lost during this incident.

The increase in this risk worldwide, and particularly in Mexico, is pushing organizations to become more aware of the importance of cybersecurity. However, this approach must be implemented intelligently with services and solutions that address critical business processes, improving service availability and focusing on the specific needs of this sector.

" 79% of SMEs suffered cyberattacks in 2020. "

" SMEs are at greater risk of cyberattacks. "

Fondo-CaaS Ciberseguridad Pymes Nordster

The best cybersecurity strategy in one package.

Nordstern has designed a package with eight premium cybersecurity services to build a solid strategy within your business's reach.

Click on each service for details.

CaaS Ciberseguridad Pymes as a Service
DESCARGA AQUÍ
el brochure con la lista
de precios y los detalles del

Paquete CaaS para Empresas
de todos los tamaños

By completing this form, you agree to Nordstern's terms and conditions and privacy notice .

Análisis de Brecha ISO 27001

ISO 27001 Gap Analysis

01-Gap Analysis_illust-ISO27001-Cib

SCOPE

Basic Gap Analysis ISO 27001.

  • General questionnaire.

  • Understanding current processes and controls.

  • Understanding the maturity of the current Information Security and Cybersecurity strategy.

  • Business Continuity Risk Analysis (IT perspective).

DELIVERABLES

Executive report:

  • Gap Analysis.

  • Risk Analysis.

  • Risk heat map.


SCHEME

  • An annual exercise.

REQUIREMENTS

  • Answer questionnaires.
    Asset inventories.
    Understanding sessions with business operations and IT operations personnel

EXCLUSIONS

  • Does not include gap analysis with other regulations (PCI, ISO 27032, etc.).

Vulnerability management

02-Management_of_vulnerabildades_ilust_Cibe

SCOPE

  • Periodic analysis of information assets (Windows or Linux Servers).

  • Scanning for malware with known signatures or known indicators.

  • Analysis model: White Box.

  • Quarterly analysis.

    • First analysis: Baseline.

    • 3 quarterly reports

DELIVERABLES

  • Quarterly technical and executive reports.


SCHEME

  • Service in 5 x 8 scheme.

REQUIREMENTS

  • Internet connection.

  • Establishing a site-to-site VPN.

  • Implementation of analysis probe.

  • The probe must be located within the segment of the equipment to be scanned.

  • AD Account – Administrator.

EXCLUSIONS

  • It does not include any remediation process (accompaniment or execution).

  • No analysis of communications or security infrastructure is contemplated.

Gestión de vulnerabilidades
Correlación de Eventos

Event Correlation (Basic SIEM)

03-Correlation-of-Events_ilust_Ciberseg

SCOPE

  • Sources: Servers, FW and AV.

  • Security Alerts (Standard):

    • Login Alerts - Server.

    • Account Change Alerts - Server.

    • Privilege Change Alerts - Server.

    • Application Installation Alerts - Server.

    • Crash Alerts - FW.

    • Infected Device Alerts - AV.

  • Correlation use cases. (Standard)

  • Log storage for 60 days.

DELIVERABLES

  • Incident reports (unlimited).

  • Monthly technical/executive service report.


SCHEME

Service in 7 x 24 scheme (alert).

Alerting channels: KlugIT Software, instant messaging, email and telephone.

REQUIREMENTS

  • Business Objectives Analysis Session.

  • Information about sources to add.

    • IPs

    • Operating system version.

    • Syslog protocol support.

  • Internet connection.

  • Site-to-site VPN setup.

  • Implementation of log collection probe.

EXCLUSIONS

  • It does not include reports or regulatory use cases (PCI, ISO 27001, etc.)

  • Does not include on-demand reports.

Incident Response (Basic)

04_Incident_Response_Illustration_Cybersecurity

SCOPE

  • Incident Response Hours Pool.

  • Full Incident Response Cycle:
    Triage.

  • Analysis of incident evidence.

  • Diagnosis.

  • Accompaniment in Containment of

  • Incidents (malware, email, ransomware1.)

  • Recommendations for preventing subsequent incidents

DELIVERABLES

  • Technical/executive service report, per event.


SCHEME

Service in 7 x 24 scheme.

1 Given the unique characteristics of ransomware, the Incident Response service for this type of ransomware is based on a best-effort approach and does not compromise the recovery of encrypted information.

REQUIREMENTS

  • Sessions with IT and business staff.

  • Inventory of assets and services.

  • Definition of evidence delivery mechanisms.

  • Monitoring incident reporting protocols.

EXCLUSIONS

  • Forensic analysis activities are not included.

  • Recovery of encrypted information in the event of a ransomware attack is not guaranteed.

  • Additional hours beyond the contracted amount can be purchased at a preferential price.

Respuesta a Incidentes (Básico)
Prueba de Penetración (Básica)

Penetration Test

06-Penetration_Test_Illustration_Cybersecurity

SCOPE

  • An annual penetration test.

  • White Box Model (Basic, for companies with 500 users or less).

  • Gray and Black Box Model (Advanced, for companies with 501 to 1000 users)

AIM

  • An external (published service) or internal (server or service) asset (fewer than 500 users).

  • Up to 4 internal or external assets (501-1000 users).


DELIVERABLE

  • Technical / service executive report.

SCHEME

  • Service in 5 x 8 scheme

REQUIREMENTS

  • Information about the asset to be analyzed, for example:

    • IP addressing.

    • Existing applications on assets, operating systems, services, functions, credentials, etc.

  • Access via VPN site to site.

  • Express authorization for the execution of the test.

EXCLUSIONS

  • In the Basic model (500 or fewer users) gray box or black box exercises are not contemplated.

  • Limited to one goal per exercise (for fewer than 500 users).
    Code analysis or web application analysis are not contemplated.

Phishing Test

05-Phising-test_ilust_Cibersecurity_Pym

SCOPE

  • Simulated Phishing Tests.

  • Sending hooks (deceptive emails) to all or a defined sample of end users.

  • Training in best practices for phishing prevention.

DELIVERABLES

  • Executive report

    • Percentage of successful phishing on the test sent.

    • Recommendations for preventing phishing.


SCHEME

  • A half-yearly exercise.

REQUIREMENTS

  • Updated database of emails of personnel to be evaluated.

  • Express authorization for the execution of the test.

  • Inclusion of the domain used for the test in whitelists.

EXCLUSIONS

  • Does not include analysis of test results by user.

  • The generation or delivery of specific and/or customized campaigns for each organization is not contemplated.

Phishing Test
Awareness

Awareness

07-Awareness_illust_Cybersecurity-SMEs-

SCOPE

  • Pre-lesson assessments to certify the necessary level of knowledge and skills.

  • Interactive lessons. The program is divided into short lessons (2 to 10 minutes).

  • Reinforcement. Sending reminders to encourage participation.

REQUIREMENTS

  • Updated list of staff emails.

EXCLUSIONS

  • The generation or delivery of specific and/or personalized content for each organization is not contemplated.

Cybersecurity Bulletins (CERT)

08-Cybersecurity-Bulletins_illust-Pym

SCOPE

  • Monthly bulletin on the main threats recorded in the environment.

  • Threat description.

  • Preventive recommendations.

DELIVERABLES

  • Monthly delivery in digital format.

REQUIREMENTS

  • Updated list of email addresses for the organization's IT and Security staff.

EXCLUSIONS

  • The generation or delivery of specific and/or personalized content for each organization is not contemplated.

Boletines de Ciberseguridad

Add-on modules

Módulos add on

Nordstern offers these Cybersecurity modules, both independently and additionally, for companies that need to scale their technology or infrastructure to complement the services in the Cybersecurity as a Service package.

Management, Monitoring and Support

Nordstern can complement the CaaS package with Managed Security (SOC Level 1) services for the management, monitoring, and technical support of the organization's infrastructure.

  • Specialized management of security infrastructure (Firewall, UTM, Antivirus, EDR) in a continuous (7x24) and completely remote scheme, under international operating standards.

  • Continuous monitoring, which allows us to know the health, operational, and availability status of the security infrastructure, increasing our response speed.

  • Specialized Technical Support. We resolve issues with expert assistance, in Spanish, and with a thorough understanding of each client's operational needs and priorities.

Firewall, Antivirus and EDR as a Service

If your company requires a technology upgrade or a first-time implementation, Nordstern can provide any of these solutions from market-leading brands on a sales or as-a-service basis.

Kaspersky logo – Advanced enterprise-grade cybersecurity and malware protection solutions
Cisco logo – global leader in enterprise networking, cybersecurity, and technology infrastructure solutions
Fortinet Logo – Cybersecurity solutions, next-generation firewalls, and Zero Trust protection for businesses
Form E2EMS
bottom of page
window.lintrk('track', { conversion_id: 6054620 });